SynapticRewrite / RE101in20minLinks
Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con
☆128Updated 5 years ago
Alternatives and similar repositories for RE101in20min
Users that are interested in RE101in20min are comparing it to the libraries listed below
Sorting:
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- ☆54Updated 5 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- WIP - Revamped Alfred [2.0]☆40Updated 9 months ago
- ☆167Updated 5 years ago
- Proofs of Concept. Just fucking around.☆193Updated 3 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Basic tutorials for reverse engineer with radare2☆60Updated 6 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 6 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Updated 4 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated 2 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 6 years ago
- Fast Static File Analysis Framework☆104Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆148Updated 5 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆129Updated 8 years ago
- ☆98Updated 6 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Updated 4 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- This is a bash script to bypass 802.1x NAC☆100Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆79Updated 7 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 6 years ago
- Red Team Resources☆60Updated 7 years ago
- SNIcat☆128Updated 4 years ago
- A malware analysis and classification tool.☆190Updated 4 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago