alfdav / ZinesLinks
Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference
☆49Updated 5 years ago
Alternatives and similar repositories for Zines
Users that are interested in Zines are comparing it to the libraries listed below
Sorting:
- ☆34Updated 7 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆45Updated last month
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆168Updated 3 months ago
- LD_PRELOAD rootkit☆134Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 2 months ago
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 3 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated last year
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆48Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Packet crafting, injection and sniffing tool☆68Updated 2 weeks ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆121Updated 9 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆78Updated 2 months ago
- A memorial site for Hackers and Infosec people who have passed☆137Updated 3 months ago
- Collected and authored guides for personal and operational security.☆62Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 10 months ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Heap Exploitation Resources☆20Updated 2 years ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 6 years ago
- Custom Binary Ninja Themes☆12Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 9 months ago
- www.phrack.org☆76Updated 2 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago