PinkDraconian / PwnZeroToHero-0x05-labsLinks
☆10Updated 3 years ago
Alternatives and similar repositories for PwnZeroToHero-0x05-labs
Users that are interested in PwnZeroToHero-0x05-labs are comparing it to the libraries listed below
Sorting:
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 7 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- Custom Binary Ninja Themes☆12Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆39Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆19Updated last year
- The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com☆18Updated 3 weeks ago
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34Updated last year
- This is the official repository for Basic Malware Analysis Course☆20Updated 4 years ago
- ☆27Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- ☆25Updated 2 years ago
- aws cli pentesting/red team snippets☆32Updated 2 years ago
- ☆27Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 4 years ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Updated last year
- ☆26Updated 3 years ago
- Repo for all my exploits/PoCs☆53Updated 8 months ago
- Script to chain search parameters for MalwareBazaar☆12Updated 11 months ago
- ☆42Updated 9 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year