ZigzagSecurity / survival-guide-radare2Links
Basic tutorials for reverse engineer with radare2
☆60Updated 6 years ago
Alternatives and similar repositories for survival-guide-radare2
Users that are interested in survival-guide-radare2 are comparing it to the libraries listed below
Sorting:
- Alphanumeric Encoder☆25Updated 6 years ago
- ☆53Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- API testing tool written with Python☆56Updated 8 years ago
- ☆36Updated 5 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- Red Team Resources☆60Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- ☆36Updated 7 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆74Updated 5 years ago
- ☆99Updated 6 years ago
- ☆22Updated 8 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- async mass DNS resolver☆81Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆68Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- ☆23Updated 4 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated 9 months ago
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- ☆78Updated 8 years ago