Programs used in the Exploitation Tutorial. Check out thehackerway.com
☆20Mar 11, 2014Updated 11 years ago
Alternatives and similar repositories for ExploitSerie
Users that are interested in ExploitSerie are comparing it to the libraries listed below
Sorting:
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Materiales de estudio Certificaciones CISSP y CEH☆34Oct 10, 2015Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- Todo☆23Nov 2, 2020Updated 5 years ago
- Tortazo for TOR☆36May 27, 2015Updated 10 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- The utility for CTF hacker competition for team hacking and flag submitting☆43Dec 5, 2017Updated 8 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 6 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- App para Descargar Videos de Youtube☆11Jun 20, 2016Updated 9 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Using simpleCV to count faces☆16Jan 30, 2012Updated 14 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- Some examples of integrations with Transcend in various languages.☆11Dec 22, 2025Updated 2 months ago
- ☆47Jan 1, 2021Updated 5 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆17Jul 25, 2014Updated 11 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- An example Phoenix real-time web application for pointing cards☆10Jan 4, 2023Updated 3 years ago
- Chef receipe to setup L2TP over IPSec VPN, or IPSec tunneling site-to-site VPN using openswan.☆17Jun 12, 2015Updated 10 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Build a Serverless Lie Detector that uses AI for Facial Recognition (with Node.js, Azure Functions, Azure Face API, and Courier API).☆10Sep 7, 2022Updated 3 years ago
- ☆32Jul 7, 2015Updated 10 years ago
- Rapid Deployment Infrastructure for Red Teaming and Penetration Testing☆44Aug 29, 2022Updated 3 years ago
- Charlas, tutoriales, charlas relámpago☆11Jun 5, 2019Updated 6 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Files from module_3☆12Aug 24, 2020Updated 5 years ago
- SIEM Visibility assessment☆14May 22, 2023Updated 2 years ago
- Authenticate users to your web application using public key cryptography by becoming a webauthn relying party☆13Jun 19, 2024Updated last year
- PowerShell Obfuscator☆11Jul 21, 2022Updated 3 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago