Notes to the book
☆20Oct 29, 2015Updated 10 years ago
Alternatives and similar repositories for HackingTheArtOfExploitation-notes
Users that are interested in HackingTheArtOfExploitation-notes are comparing it to the libraries listed below
Sorting:
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- ECE 264 Advanced C Programming☆17Apr 10, 2019Updated 6 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Udev helper for naming devices per BIOS names☆19Sep 21, 2023Updated 2 years ago
- 🧠 A field guide to mnemonics for engineers: outages, RCAs, infra design, burnout, and conflict. Structured entries with when-to-use, pit…☆16Feb 1, 2026Updated last month
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- Scapy Robot Framework Library☆10Oct 22, 2019Updated 6 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated last year
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- simple storage helper inspired by the redis api☆19Jun 30, 2016Updated 9 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- overlay filesystem userspace utilities, include fsck.overlay which is used to check and optionally repair underlying directories of overl…☆14Jun 8, 2021Updated 4 years ago
- ☆10Jan 16, 2021Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- PTF-based data plane tests for ONOS fabric.p4☆15Aug 6, 2021Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- dnsoverhttps - D'oh!☆14Sep 20, 2018Updated 7 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- A blog about my work in open-source and fast networking☆13Nov 16, 2024Updated last year
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago