BroadbentT / BINARY-MASTER
A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.
☆10Updated 8 months ago
Alternatives and similar repositories for BINARY-MASTER:
Users that are interested in BINARY-MASTER are comparing it to the libraries listed below
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- ☆12Updated 4 years ago
- Noob Penetration tester☆11Updated 9 months ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 3 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆16Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- Burp suite Certificate modification tool☆18Updated last year
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago