0xroman1 / Scuffed_Low_Level_StashView external linksLinks
Stash for Binary Exploitation and Reverse Engineering Resources
☆105Sep 22, 2020Updated 5 years ago
Alternatives and similar repositories for Scuffed_Low_Level_Stash
Users that are interested in Scuffed_Low_Level_Stash are comparing it to the libraries listed below
Sorting:
- RE / Binary Exploitation Resources☆74Dec 1, 2017Updated 8 years ago
- Taking another crack at OS dev...☆11Jun 12, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ☆21Jan 11, 2022Updated 4 years ago
- This is a MD5 password/passphrase brute force tool☆10Mar 13, 2021Updated 4 years ago
- Detects and extracts images from Goerli Testnet blockchain☆24Nov 25, 2021Updated 4 years ago
- ☆12Jan 14, 2025Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆12Jun 25, 2019Updated 6 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- ☆23Jul 3, 2020Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- GitLab 12.9.0 Arbitrary File Read☆71Apr 23, 2021Updated 4 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆21Aug 6, 2019Updated 6 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- vulnerable windows binaries for exploitation practice☆49Jun 6, 2022Updated 3 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Pokemon Scarlet&Violet randomizer☆13Jul 19, 2023Updated 2 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago
- Linux Binary Exploitation☆1,356Jun 15, 2021Updated 4 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago