MarginResearch / resources
☆22Updated last year
Related projects: ⓘ
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- Lena's scripts/code/resources for malware analysis☆16Updated 3 months ago
- Repo for all my exploits/PoCs☆28Updated this week
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆12Updated last month
- Burp extension used to snip any header from all the requests.☆21Updated 10 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆17Updated last year
- This script is designed to exploit a heap buffer overflow vulnerability in a socks5 proxy server.☆22Updated 6 months ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆19Updated this week
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- SecurityBsides Roma Conference Repo☆10Updated last year
- ☆45Updated this week
- Timestomp Tool to flatten MAC times with a specific timestamp☆45Updated 11 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 7 months ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆18Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆19Updated 6 years ago
- My journey and notes on learning Offensive Security from the ground up☆16Updated 6 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 8 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated 7 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 2 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆37Updated 11 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 6 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆22Updated 2 years ago
- ☆28Updated last year
- hiding in plain sight: part 2☆40Updated 2 months ago
- aiohttp LFI (CVE-2024-23334)☆22Updated 6 months ago
- ☆11Updated last month
- Tool for analyzing SAP Secure Network Communications (SNC).☆49Updated 5 months ago