0xdeadbeefJERKY / presentationsLinks
☆18Updated 6 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 8 years ago
- Fighting String Encryption in Android Malware☆59Updated 3 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Presentations☆11Updated 7 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- ☆14Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- ☆28Updated 7 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆28Updated 8 years ago
- ☆28Updated 4 years ago
- Telco training☆26Updated 6 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- cve-2019-11931☆35Updated 5 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Group Policy Hijacking☆31Updated 7 years ago
- CTF Writeups☆26Updated 5 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- A demo app vulnerable to directory traversal☆15Updated 5 years ago