Notes to the book
☆20Oct 29, 2015Updated 10 years ago
Alternatives and similar repositories for HackingTheArtOfExploitation-notes
Users that are interested in HackingTheArtOfExploitation-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago
- collection of various grep patterns collected from tomnomnom/gf and other places☆23Oct 13, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Collection of useful AutoIT-Scripts☆13May 12, 2024Updated last year
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- Open source exploit framework made in C#☆54Jan 27, 2025Updated last year
- A simple storage class inspired by the redis api on top of Sqlite.☆16Dec 8, 2015Updated 10 years ago
- Hacking: The Art of Exploitation, 2nd Edition☆26Feb 5, 2014Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- As a new YouTuber, you might be looking for a way to increase your YouTube subscribers, views, and likes. There are many websites that ar…☆22Sep 24, 2025Updated 6 months ago
- simple storage helper inspired by the redis api☆19Jun 30, 2016Updated 9 years ago
- SentinelOne Windows Installation Diagnostic☆12Apr 14, 2025Updated 11 months ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Mar 17, 2020Updated 6 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago
- Simplifies and automates the handeling of tags and tag maps.☆16Nov 16, 2010Updated 15 years ago
- Click heatmaps with Google Analytics☆36Aug 21, 2013Updated 12 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sell anything online, safely and anonymously.☆122Oct 20, 2016Updated 9 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Open Source AI Agents☆22Apr 1, 2025Updated 11 months ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Jan 23, 2022Updated 4 years ago