1337list / ephemera-miscellanyLinks
Ephemera and other documentation associated with the 1337list project.
☆395Updated 7 years ago
Alternatives and similar repositories for ephemera-miscellany
Users that are interested in ephemera-miscellany are comparing it to the libraries listed below
Sorting:
- CTFs, solutions and presentations☆290Updated 3 months ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆317Updated 6 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆381Updated 7 years ago
- Red Team Tactics, Techniques, and Procedures☆407Updated last month
- Various Tools and Docker Images☆280Updated 3 months ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- OPCDE Cybersecurity Conference Materials☆614Updated 4 years ago
- Kinda useful notes collated together publicly☆496Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- PwnWiki - The notes section of the pentesters mind.☆564Updated 6 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆883Updated 6 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,006Updated 6 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆633Updated 7 years ago
- Issues to consider when planning a red team exercise.☆620Updated 7 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Open source offensive security platform for red team, by red team.☆386Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- Resource for developing infosec skills for OSCP☆115Updated last year
- Post Exploitation Wiki☆522Updated 5 years ago
- ☆508Updated 7 years ago
- ☆306Updated last week
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 4 years ago
- Professionally Evil Web Application Penetration Testing 101☆143Updated 5 years ago
- ☆39Updated 5 years ago
- A repository for large scripts from my book.☆161Updated 3 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 5 months ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Phishing catcher using Certstream☆16Updated 6 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago