ZigzagSecurity / survival-guide-radare2
Basic tutorials for reverse engineer with radare2
☆61Updated 6 years ago
Alternatives and similar repositories for survival-guide-radare2:
Users that are interested in survival-guide-radare2 are comparing it to the libraries listed below
- Updated 6 years ago
- ☆25Updated 3 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- ☆38Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 6 months ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- Docker Version of Aquatone☆13Updated 6 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Updated 4 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago