XlogicX / LearnLinks
Learn the very basics of different languages
☆48Updated 2 months ago
Alternatives and similar repositories for Learn
Users that are interested in Learn are comparing it to the libraries listed below
Sorting:
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A shellcode testing harness.☆69Updated 11 months ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆36Updated 12 years ago
- ☆27Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- The educational Animus malware☆18Updated 5 years ago
- Hacking Games in a Hacked Game☆29Updated 10 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 7 months ago