BroadbentT / BINARY-MASTER
A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.
☆10Updated 10 months ago
Alternatives and similar repositories for BINARY-MASTER:
Users that are interested in BINARY-MASTER are comparing it to the libraries listed below
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Noob Penetration tester☆11Updated 10 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ☆16Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- Pentesting notes☆16Updated last month
- ☆29Updated 2 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- ☆18Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- MacroExploit use in excel sheet☆20Updated last year