0xdeadbeefJERKY / presentationsLinks
☆18Updated 6 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- Break Apps with Frida workshop material☆45Updated 7 years ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 8 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Presentations☆11Updated 7 years ago
- Frida FDE bruteforce Samsung S7 Edge☆48Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- ☆14Updated 6 years ago
- ☆28Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- Telco training☆26Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- ☆43Updated 6 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆28Updated 8 years ago
- ☆20Updated 9 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago
- ☆31Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Curriculum Vitae European & Biography☆35Updated last year