LunaM00n / LOL-PwnView external linksLinks
Free Course Materials for LOL-Pwn
☆20May 29, 2020Updated 5 years ago
Alternatives and similar repositories for LOL-Pwn
Users that are interested in LOL-Pwn are comparing it to the libraries listed below
Sorting:
- LOL's collections☆24Oct 4, 2020Updated 5 years ago
- Udemy – Linux Heap Exploitation☆54Jun 14, 2021Updated 4 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Jul 18, 2022Updated 3 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- Awesome Data Sanitization☆12Jun 6, 2021Updated 4 years ago
- A collection of small examples demonstrating various linker features☆12Dec 29, 2018Updated 7 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- type 1 thin hypervisor written in C++☆17Dec 18, 2024Updated last year
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆13May 21, 2021Updated 4 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆10Aug 9, 2018Updated 7 years ago
- A trivial raycaster using minifb for rendering/input☆10Jan 2, 2023Updated 3 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- Compare A/AAAA DNS record for any domain in your browser by DoH JSON API.☆12Nov 13, 2023Updated 2 years ago
- GUI / CLI tools & resources used for Capture-The-Flags competitions and Computer Security learning☆12Aug 11, 2021Updated 4 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 4 months ago
- ☆10Oct 12, 2021Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 18, 2018Updated 7 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- ☆10Aug 6, 2019Updated 6 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- ☆14Nov 17, 2015Updated 10 years ago
- Our PoC for the vulnerable products☆47Dec 1, 2021Updated 4 years ago