alphalegionwarrior / cybersecurityLinks
cybersecurity toolbox
☆10Updated 3 years ago
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- k8逆向工程,vs2010,webshell、cmdshell、exploit-db、xss、cookiebrowser☆31Updated 7 years ago
- SecNews☆16Updated 7 years ago
- ☆19Updated 10 years ago
- a very simple rootkit for fun☆19Updated 7 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Updated 7 years ago
- cve-2019-0808-poc☆48Updated 6 years ago
- KiMi 漏洞感知机器人扫描框架 @KiMi-VulnBot @KiMiThreatPerception☆23Updated 8 years ago
- Steganography Payload☆47Updated 8 years ago
- CVE-2018-15982_EXP_IE☆12Updated 7 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Updated 6 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Updated 8 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 6 years ago
- simple shellcode loader for linux & win, x86 & x64☆34Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆21Updated 2 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆26Updated 6 years ago
- 一些漏洞的环境/利用工具/分析☆10Updated 5 years ago
- 简单的Linux远程控制☆20Updated 8 years ago
- Malicious PDF document parsing tool☆16Updated 8 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- 获取系统KB补丁对于的MS号☆24Updated 6 years ago
- 稳定多线程中的inline hook☆16Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 7 years ago
- PoC for CVE-2019-10207☆20Updated 3 years ago
- Slide deck for DefCon Beijing☆39Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 8 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 2 months ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 6 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Updated 2 years ago
- Browser Fuzzing with Machine Learning☆22Updated 6 years ago