0xmilkmix / trainingView external linksLinks
source code and binaries related to my trainings
☆20Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for training
Users that are interested in training are comparing it to the libraries listed below
Sorting:
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Feb 17, 2017Updated 8 years ago
- ☆79May 13, 2016Updated 9 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆117Aug 22, 2016Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- Capture The Flag hacker contest daemon☆33Oct 21, 2017Updated 8 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Material do Grupo de Estudos em Ciência de Dados☆13Jan 25, 2021Updated 5 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- AFL coverage tool using Clang SanitizerCoverage☆37Nov 13, 2016Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- frameworks_base for Geeksphone Peak and Keon☆12Jan 13, 2015Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆50Jun 6, 2023Updated 2 years ago
- A tutorial to help you make the move to GitHub☆10Jun 2, 2023Updated 2 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Topology library for Coq☆12Dec 24, 2015Updated 10 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 8 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- NVIDIA Compute Unified Device Architecture Toolkit☆15Feb 2, 2026Updated last week
- A talk about basic Bluetooth Low Energy concepts followed by code explanations.☆11Jun 24, 2017Updated 8 years ago
- ☆12Aug 12, 2025Updated 6 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 7 months ago
- ☆13Oct 29, 2024Updated last year
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- A client to facilitate simple RESTful requests☆18Sep 7, 2010Updated 15 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Postador Automático de Imagens no Facebook.☆10Feb 13, 2021Updated 5 years ago
- ☆13Oct 31, 2017Updated 8 years ago