NimitS1 / best_of_stackoverflow
My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!
☆13Updated 4 years ago
Alternatives and similar repositories for best_of_stackoverflow:
Users that are interested in best_of_stackoverflow are comparing it to the libraries listed below
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- Ransack Post Exploitation Tool☆16Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- ☆92Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- ☆14Updated 7 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 8 years ago
- ☆11Updated 7 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- MITM 'n' BDF☆10Updated 9 years ago
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Updated 8 years ago
- ☆43Updated 8 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- #HackingTogether☆13Updated 8 years ago
- Independent file type identification python library☆12Updated 2 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ☆27Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Some simple and useful tools☆15Updated 6 years ago