MustafaTanguner / MnemonicLinks
Mnemonic Cryptography
☆18Updated 2 years ago
Alternatives and similar repositories for Mnemonic
Users that are interested in Mnemonic are comparing it to the libraries listed below
Sorting:
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
 - Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
 - brute-forcing su for fun and possibly profit☆98Updated 6 years ago
 - Code and notes for the 2021 HackTheBox Business CTF☆37Updated 4 years ago
 - A collection of my adventures through hackthebox.eu☆36Updated 4 years ago
 - ☆66Updated 3 years ago
 - Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
 - For my Try Hack Me room: Intro To Pwntools☆28Updated 4 years ago
 - PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆49Updated last year
 - Materials from different CTFs for later reuse☆26Updated 2 years ago
 - A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 2 years ago
 - Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
 - Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
 - Pentest stuff☆49Updated last year
 - ☆108Updated last year
 - Toolset for automating common management actions used in CTF's☆41Updated 4 years ago
 - ☆49Updated last year
 - ☆62Updated 3 years ago
 - BurpSuite using the document and some extensions☆70Updated 5 years ago
 - Course enrolments allowed privilege escalation from teacher role into manager role to RCE☆44Updated 4 years ago
 - HackTheBox High Definition Badge Generator☆27Updated 6 years ago
 - ☆33Updated 4 years ago
 - Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
 - ☆42Updated last year
 - To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
 - This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Updated 7 years ago
 - Command line client for HackTheBox☆23Updated last year
 - A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
 - CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆66Updated 3 years ago
 - ☆31Updated 5 years ago