DavidDeLille / Offensive_Computer_Security
Files for the course Offensive Computer Security 2014 (FSU)
☆12Updated 9 years ago
Related projects: ⓘ
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- ☆15Updated this week
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- ☆30Updated this week
- ☆14Updated this week
- ☆21Updated this week
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- ☆0Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 7 years ago
- ☆26Updated this week
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 6 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 3 years ago
- ☆23Updated 6 years ago
- A Burp Extender plugin, that will deserialized java objects and encode them in XML using the Xtream library.☆25Updated 9 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆10Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Updated 4 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 6 years ago
- ☆19Updated this week
- ☆13Updated this week
- ☆15Updated this week
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- ☆46Updated 6 years ago