MustafaTanguner / MnemonicLinks
Mnemonic Cryptography
☆18Updated 3 years ago
Alternatives and similar repositories for Mnemonic
Users that are interested in Mnemonic are comparing it to the libraries listed below
Sorting:
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Updated 4 years ago
- brute-forcing su for fun and possibly profit☆99Updated 6 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆58Updated 3 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago
- For my Try Hack Me room: Intro To Pwntools☆31Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- ☆33Updated 5 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆50Updated 2 years ago
- Pentest stuff☆50Updated 2 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆20Updated 4 years ago
- Collection of scripts and documentations of retired machines in the hackthebox.eu platform☆41Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ☆33Updated 5 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Updated 5 years ago
- ☆67Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- ☆14Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Updated 2 years ago
- LFI to RCE tool.☆15Updated 5 years ago
- ☆53Updated last year
- A collection of my adventures through hackthebox.eu☆38Updated 4 years ago
- ☆85Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆26Updated last week
- InfluxDB CVE-2019-20933 vulnerability exploit☆42Updated 3 years ago
- You don't need wires to be connected☆42Updated 5 years ago
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12Updated 4 years ago
- Javascript payload that inject a malicious payload into the copy-buffer of the victim☆36Updated 7 years ago