☆12Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for InfoSecNotes
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
Sorting:
- POC CVE-2019-0708 with python script!☆14Jun 24, 2019Updated 6 years ago
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- Systems and Software Security☆16Nov 13, 2025Updated 3 months ago
- ☆12Aug 20, 2021Updated 4 years ago
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Jul 9, 2024Updated last year
- CVE-2019-0708 Exploit Tool☆18Jul 18, 2019Updated 6 years ago
- ☆11Feb 16, 2025Updated last year
- extracts shellcode from a nasm compile macho binary☆17Jan 28, 2021Updated 5 years ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- Stack Based buffer overflow attack☆19Nov 25, 2023Updated 2 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- vulnerable windows binaries for exploitation practice☆49Jun 6, 2022Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Jun 6, 2022Updated 3 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- Everything you see on my tutorials is here in this repo☆10Jun 19, 2017Updated 8 years ago
- 个人网站☆14Feb 18, 2026Updated last week
- rcat☆75Mar 7, 2022Updated 3 years ago
- ☆31Oct 13, 2025Updated 4 months ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43May 18, 2024Updated last year
- ☆42Dec 22, 2020Updated 5 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- ☆10Nov 16, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Browse, set, and submit your RMP works here!☆12Updated this week
- 基于docsify的博客,主要记录一些工作中的经验和总结。地址:https://wudidehuangtiandi.github.io/mydoc/☆11Mar 3, 2025Updated 11 months ago
- Write ups for Ph0wn CTF☆48Aug 12, 2025Updated 6 months ago
- A study on how Bitcoin is perceived and misperceived☆10Jun 21, 2021Updated 4 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- Inspecting the Moto Audio application running on Motorola Android devices☆10Aug 28, 2021Updated 4 years ago