NoiSeBit / PodcastsLinks
нерегулярный подкаст о жизни ресечеров по обе стороны океана
☆34Updated 7 years ago
Alternatives and similar repositories for Podcasts
Users that are interested in Podcasts are comparing it to the libraries listed below
Sorting:
- Filet-O-Firewall Vulnerability PoC☆61Updated 9 years ago
- ☆9Updated 9 years ago
- Asynchronous HTTP pipelining directory buster☆24Updated 4 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Updated 9 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Updated 11 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Advanced virtual host bruteforcer☆31Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Configuration security audit framework☆21Updated 9 years ago
- The utility for CTF hacker competition for team hacking and flag submitting☆42Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- LPE exploits for Secret Net and Secret Net Studio☆50Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- UAC Copy Tool☆9Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- ☆10Updated 9 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- ☆15Updated 2 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago