AidenPearce369 / ExploitDev
☆16Updated this week
Related projects: ⓘ
- Gonna share my writeups and resources here☆57Updated last year
- Writeup for the challenges in NahamCon CTF 2020☆80Updated 4 years ago
- A Crypto-CTF Assistant For Saving You Time☆17Updated 2 years ago
- ☆57Updated 2 years ago
- Pwning notes☆44Updated last month
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 3 years ago
- ☆34Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- Generate common Reverse Shells for Pentesting☆38Updated 3 years ago
- Build your own reconnaissance system with Osmedeus Next Generation☆177Updated 3 months ago
- ☆13Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆227Updated 2 years ago
- An aggregation of CTF challenges and write-ups for csictf 2020!☆51Updated last year
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆67Updated last year
- There are many cheat sheets out there, but this is mine.☆28Updated 7 months ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆54Updated 2 years ago
- Mario the game but you rescue the princess by hacking.☆23Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆96Updated 4 years ago
- Repository to house markdown templates for researchers☆191Updated this week
- Web Application Security Testing Tools☆230Updated 6 months ago
- Complex payload encoder☆207Updated 8 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆209Updated last month
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆190Updated last year
- Chrome extension that lists Amazon S3 Buckets while browsing☆74Updated last year
- Tool to find the real IP behind CDNs/WAFs like cloudflare using passive recon by retrieving the favicon hash. For the same hash value, al…☆176Updated 3 years ago
- The aim of this Reposiotry is to Provide the Resoursces of Learning at one place For Bug Bounty Hunters.☆135Updated last year
- Repository for writeups of ctf challenges☆13Updated 7 months ago
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆14Updated 2 years ago
- Go scripts for finding sensitive data like API key / some keywords in the github repository☆158Updated 2 years ago