A Buffer Overflow checklist, with plug-and-play pre-written python scripts.
☆33Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Buffer-Overflow
Users that are interested in Buffer-Overflow are comparing it to the libraries listed below
Sorting:
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆44Mar 23, 2022Updated 3 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 8 months ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- ☆14Mar 8, 2023Updated 3 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 5 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Feb 10, 2021Updated 5 years ago
- A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do s…☆14Jan 12, 2021Updated 5 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Sep 2, 2021Updated 4 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆49Mar 25, 2022Updated 3 years ago
- buffer overflow skeleton scripts, can be used for any TCP based socket flows.☆10Oct 14, 2020Updated 5 years ago
- ☆88May 27, 2021Updated 4 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- ☆28May 8, 2021Updated 4 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- ☆13May 9, 2017Updated 8 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- Solutions for Standard Problems on Algorithms & Data Structures in C++☆16Feb 7, 2024Updated 2 years ago
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- Conveniently generate shareable URLs for various social media websites.☆10Mar 9, 2025Updated last year
- Complite Web Application Penetration Testing☆27Jul 9, 2021Updated 4 years ago
- It is a compilation of some resources for preparing for OSCP.☆205May 1, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- Academie en ligne de CyberDefense pour la jeunesse du continent Africain.☆18Oct 6, 2020Updated 5 years ago
- ☆15Jul 3, 2025Updated 8 months ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- 安卓设备检测☆19Jul 12, 2023Updated 2 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- ☆174Oct 26, 2025Updated 4 months ago