SynapticRewrite / RE101in20minLinks
Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con
☆125Updated 5 years ago
Alternatives and similar repositories for RE101in20min
Users that are interested in RE101in20min are comparing it to the libraries listed below
Sorting:
- Proofs of Concept. Just fucking around.☆193Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- JIRA Secure Attachment Looter☆70Updated 4 years ago
- Slides from my talk in "Hackinparis" 2019 edition☆91Updated 5 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- WIP - Revamped Alfred [2.0]☆39Updated 3 weeks ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- Red Team Resources☆60Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 4 years ago
- ☆54Updated 4 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- ☆169Updated 5 years ago
- ☆98Updated 6 years ago
- ☆122Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 6 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆78Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Fast Static File Analysis Framework☆103Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆73Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- ☆76Updated 6 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆108Updated 5 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago