Exploits for the TryHackMe room hackerNote
☆32Feb 20, 2020Updated 6 years ago
Alternatives and similar repositories for hackerNoteExploits
Users that are interested in hackerNoteExploits are comparing it to the libraries listed below
Sorting:
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- Test tool for CVE-2020-1472☆37Jul 1, 2023Updated 2 years ago
- Created for my TryHackMe room☆183Dec 31, 2019Updated 6 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41May 3, 2021Updated 4 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- For my Try Hack Me room: Intro To Pwntools☆34Jun 10, 2021Updated 4 years ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 5 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- ☆13May 9, 2017Updated 8 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Conveniently generate shareable URLs for various social media websites.☆10Mar 9, 2025Updated last year
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆11Mar 9, 2023Updated 3 years ago
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- A simple compiling of notes and information / teachings on how stegonography works, and how we can use stegonography to execute system co…☆11Feb 27, 2022Updated 4 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- Hash type identifier (CLI & lib)☆955Updated this week
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- ☆13May 14, 2022Updated 3 years ago
- Go implementation of RFC9497, Oblivious Pseudorandom Functions and Verifiable variants.☆12Updated this week
- Linux PAM Backdoor☆368Nov 13, 2023Updated 2 years ago
- OCaml implementation of Fiat-Shamir Zero Knowledge Proof system as a client/server authentication protocol☆12Feb 7, 2017Updated 9 years ago
- ☆11Aug 26, 2024Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated last year
- Personal website, darkstar7471.com☆11Dec 16, 2021Updated 4 years ago
- Return domains in CSP headers in http response☆16Aug 17, 2021Updated 4 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Oct 6, 2023Updated 2 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Apr 17, 2024Updated last year
- android-sms2csv.py extract SMS messages from Android backup files☆13Jun 19, 2020Updated 5 years ago
- ☆13Jan 19, 2024Updated 2 years ago
- Oblivious pseudorandom function over an elliptic curve☆21Oct 26, 2023Updated 2 years ago
- ☆13Dec 5, 2018Updated 7 years ago
- CodeQL and Binary Ninja scripts to accompany the blog post☆11Feb 3, 2023Updated 3 years ago
- Workaround to use Arduino Leonardo/Micro with german keyboard layout☆11Dec 1, 2020Updated 5 years ago