2S1one / SLAE
SecrutiyTube Linux Assembly Exam
☆10Updated 5 years ago
Alternatives and similar repositories for SLAE:
Users that are interested in SLAE are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆23Updated 4 years ago
- Simulates a logged in user.☆16Updated 9 months ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- yet another dirbuster☆19Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆21Updated 5 years ago
- another nmap summarising script☆26Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Scripts for OSCE☆18Updated 6 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Data exfiltration using reflective DNS resolution covert channel☆52Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- ☆50Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ☆16Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆26Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Methods of C2☆21Updated 9 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Updated 5 years ago