Crypto-Cat / REdiREKT
Code-base to go with academic paper "REdiREKT: Extracting Malicious Redirections from Exploit Kit Traffic" available @ https://pure.qub.ac.uk/en/publications/redirekt-extracting-malicious-redirections-from-exploit-kit-traff and short video presentation and tool demo here: https://www.youtube.com/watch?v=DIXRouNfq6E
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for REdiREKT
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆35Updated 2 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆12Updated 2 years ago
- A shell script that mimics sudo and sends you back the password☆42Updated last year
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 10 months ago
- Windows File Integrity -- an archive of information on installed Windows binaries.☆30Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- ☆14Updated last year
- Materials from different CTFs for later reuse☆22Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆23Updated last week
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆27Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆15Updated last year
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆72Updated 10 months ago
- Python, C++ and Go☆22Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆55Updated last month
- Collection Of Reverse Shell that can easily generate using Python3☆57Updated 9 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆15Updated 3 years ago
- Enumeration & fingerprint tool☆23Updated 8 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆14Updated 2 years ago
- ☆17Updated 3 years ago
- External Playbooks for Public Access☆31Updated 7 months ago
- A Simple Password Protected Back Door written in Python3☆21Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆34Updated 3 years ago
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year