NimitS1 / best_of_stackoverflow
My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!
☆13Updated 3 years ago
Related projects: ⓘ
- ☆32Updated this week
- ☆53Updated this week
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- ☆73Updated this week
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- everything that does not fit elsewhere☆12Updated 6 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆31Updated 6 years ago
- ☆41Updated this week
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆47Updated 7 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 8 years ago
- ☆14Updated 3 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- ☆27Updated this week
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- ☆29Updated this week
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- List of penetration testing tools.☆23Updated 4 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 7 years ago
- A large repository of links spanning all topics in information security.☆13Updated 8 years ago
- ☆29Updated this week
- ☆92Updated 6 years ago
- ☆26Updated 7 years ago