Official code repository for: Gray Hat Hacking, The Ethical Hacker's Handbook, 5th Edition.
☆202Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for GHHv5
Users that are interested in GHHv5 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Jun 21, 2016Updated 9 years ago
- fastjson全版本漏洞利用工具,只支持POST☆10Jan 5, 2021Updated 5 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- ☆138Sep 27, 2021Updated 4 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- ☆58Feb 27, 2026Updated last month
- priximal_phishing html or ino☆17May 12, 2021Updated 4 years ago
- Learn python3 in one picture.☆21Sep 15, 2015Updated 10 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆135Aug 10, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Python based angr plug in for IDA Pro.☆35Feb 25, 2018Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- BUGX.IO Vulnerability Review Standard☆13Mar 25, 2020Updated 6 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆22Nov 3, 2022Updated 3 years ago
- Library for parsing Embedded OpenType files (Microsoft embedded font "standard"), and converting them to other formats☆15Jul 14, 2025Updated 8 months ago
- ☆30Aug 8, 2015Updated 10 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆235Aug 21, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,553Jan 13, 2022Updated 4 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- ☆12May 6, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Advanced Reconnaissance Framework — Google Chrome extension☆30Mar 4, 2016Updated 10 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆115Aug 2, 2022Updated 3 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Relay emails, encrypting them with the recipient's public PGP key.☆11Nov 2, 2015Updated 10 years ago
- run AFL with pintool☆67Feb 24, 2020Updated 6 years ago
- Windows source tree reproduction based on debugging symbols and checked builds☆36Mar 21, 2016Updated 10 years ago