SynapticRewrite / RE101in20min
Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con
☆125Updated 5 years ago
Alternatives and similar repositories for RE101in20min
Users that are interested in RE101in20min are comparing it to the libraries listed below
Sorting:
- ☆54Updated 4 years ago
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- WIP - Revamped Alfred [2.0]☆39Updated this week
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 4 years ago
- Red Team Resources☆60Updated 6 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- Fast Static File Analysis Framework☆103Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 6 months ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- ☆122Updated 7 years ago
- ☆169Updated 5 years ago
- A repo to support the book☆108Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- Pentester-focused Docker registry tool to enumerate and pull images☆108Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆28Updated 5 years ago