XlogicX / Learn
Learn the very basics of different languages
☆48Updated last year
Related projects: ⓘ
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆30Updated 6 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆14Updated this week
- A shellcode testing harness.☆68Updated 2 months ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- ☆35Updated 12 years ago
- Post Exploitation Linux Toolkit☆20Updated 9 years ago
- ☆75Updated this week
- ☆20Updated this week
- Swiss Army knife for raw bytes manipulation & interception☆54Updated last year
- ☆13Updated this week
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago
- ☆26Updated 7 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Python script to quickly create hand-crafted PDF files☆21Updated 6 years ago
- ☆16Updated this week
- A proof of concept demonstrating the use of Google Drive for command and control.☆82Updated 6 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆39Updated 5 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago