2S1one / SLAE
SecrutiyTube Linux Assembly Exam
☆10Updated 5 years ago
Alternatives and similar repositories for SLAE:
Users that are interested in SLAE are comparing it to the libraries listed below
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- yet another dirbuster☆19Updated 4 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- ☆17Updated last year
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- ☆17Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆37Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 2 months ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago