Hackerstrip / Episode-ILinks
☆11Updated 10 years ago
Alternatives and similar repositories for Episode-I
Users that are interested in Episode-I are comparing it to the libraries listed below
Sorting:
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 9 years ago
- EasyCTF Writeups☆13Updated 11 years ago
- ☆43Updated 7 years ago
- Fake msxfs.dll to debug ATM trojans☆55Updated 10 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- Various tools, exploits and other short code snippets☆12Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Writeups for CTF that took place in 2015.☆13Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 6 years ago
- Fuzzing Framework☆10Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 7 years ago
- quals-2014☆21Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆35Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- finals-2014☆20Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- Scanner de vulnerabilidades Web.☆15Updated 10 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- Projects and POCs☆61Updated 11 years ago
- ☆16Updated 11 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago