☆182Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for RPISEC-Courses
Users that are interested in RPISEC-Courses are comparing it to the libraries listed below
Sorting:
- Slides and stuffs of the meetings during the 2020.☆16Jan 18, 2022Updated 4 years ago
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- header-fuzz allows you to fuzz any HTTP header with a wordlist and evaluate success or failure based on the returning HTTP status code.☆16Apr 15, 2020Updated 5 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Simple file manager for dwm☆15Dec 16, 2024Updated last year
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- ☆13Feb 24, 2024Updated 2 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,939Dec 9, 2021Updated 4 years ago
- Automated Enumeration Script for Pentesting☆34Aug 14, 2020Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- ☆16Dec 17, 2022Updated 3 years ago
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- Course materials for Malware Analysis by RPISEC☆4,002Aug 26, 2022Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 2 months ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- ☆97Feb 26, 2020Updated 6 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- ☆2,934Feb 8, 2026Updated last month
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- The Dumb Network Fuzzer☆21Jul 18, 2023Updated 2 years ago
- microSD male breakout board☆23Oct 19, 2019Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- writeups for CTFs and other stuff☆24Dec 29, 2020Updated 5 years ago
- scapy-dhclient scapy-dhcpd scapy-pppoe-client scapy-pppoe-server☆19Aug 29, 2024Updated last year
- ☆23Aug 18, 2024Updated last year
- Kumpulan virtex WhatsApp☆32Aug 17, 2020Updated 5 years ago
- Latest ios RCE Vulnerability disclosed by Google Security Researcher☆44Jul 30, 2019Updated 6 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Fork Free Fail Repeat☆48Aug 22, 2021Updated 4 years ago
- Micro SD Sniffer TOL-09419☆24Jul 21, 2015Updated 10 years ago
- network pcap fuzzer☆22Jan 19, 2015Updated 11 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Jan 14, 2026Updated last month
- talking LED mask for BSides 2020 presenters☆22Dec 19, 2020Updated 5 years ago