PacktPublishing / Penetration-Testing-with-Shellcode
Penetration Testing with Shellcode, published by Packt
☆37Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Penetration-Testing-with-Shellcode
- Mastering Malware Analysis, published by Packt☆37Updated last year
- ☆24Updated 3 years ago
- A repo to support the book☆39Updated last year
- Advanced Malware Analysis [video], published by Packt☆20Updated last year
- SLAE x86 from Pentester Academy☆14Updated 4 years ago
- Binary Analysis Cookbook, published by Packt☆39Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 4 years ago
- Penetration testing with shellcode codes☆27Updated 6 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 5 years ago
- Learning Python Web Penetration Testing, published by Packt☆39Updated last year
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- Vulnserver exploits☆13Updated 4 years ago
- Python Penetration Testing for Developers, published by Packt☆39Updated last year
- Presentaciones de congresos☆51Updated 4 months ago
- ☆19Updated 3 years ago
- ☆24Updated 5 years ago
- ☆35Updated 6 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 2 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Challenge files which are deployed in the container for the user☆24Updated 5 months ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆42Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆17Updated 3 years ago