Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.
☆204Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for GHHv5
Users that are interested in GHHv5 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- Mastering Malware Analysis, published by Packt☆41Jan 18, 2023Updated 3 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆56Jun 21, 2016Updated 9 years ago
- ☆26Jan 18, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- ☆60Feb 27, 2026Updated 2 months ago
- Learn python3 in one picture.☆21Sep 15, 2015Updated 10 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Exploit for CVE-2023-38571☆14Sep 27, 2023Updated 2 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 7 years ago
- A collection of Open Data for the data freaks out there.☆37Jan 4, 2018Updated 8 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 5 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆53Jul 5, 2017Updated 8 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- Library for parsing Embedded OpenType files (Microsoft embedded font "standard"), and converting them to other formats☆15Jul 14, 2025Updated 9 months ago
- ☆30Aug 8, 2015Updated 10 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- ☆12May 6, 2020Updated 6 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Aug 2, 2022Updated 3 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago