Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.
☆203Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for GHHv5
Users that are interested in GHHv5 are comparing it to the libraries listed below
Sorting:
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Jun 21, 2016Updated 9 years ago
- Learn python3 in one picture.☆21Sep 15, 2015Updated 10 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- ☆58Feb 27, 2026Updated last week
- ☆26Jun 23, 2016Updated 9 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Extract TLS metadata from connection in JSON format.☆15Sep 29, 2020Updated 5 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- A software having all stuff related to proxy☆10Feb 12, 2023Updated 3 years ago
- ☆26Jan 18, 2026Updated last month
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Library for parsing Embedded OpenType files (Microsoft embedded font "standard"), and converting them to other formats☆15Jul 14, 2025Updated 7 months ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Dispar - Cross-platform Disassemling binary Parser☆20Nov 21, 2021Updated 4 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- Shim database persistence (Fin7 TTP)☆37Feb 25, 2020Updated 6 years ago
- BUGX.IO Vulnerability Review Standard☆13Mar 25, 2020Updated 5 years ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- Capstone: Keylogger Trojan☆34Jun 15, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Python bindings for the Zydis disassembler library☆17Jul 2, 2019Updated 6 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago