XlogicX / Learn
Learn the very basics of different languages
☆48Updated last month
Alternatives and similar repositories for Learn
Users that are interested in Learn are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A shellcode testing harness.☆69Updated 10 months ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ☆36Updated 12 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Post Exploitation Linux Toolkit☆20Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 5 months ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- ☆27Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago