ameserole / AkesoLinks
A Platform for Testing Secure Coding/Config
☆19Updated 7 years ago
Alternatives and similar repositories for Akeso
Users that are interested in Akeso are comparing it to the libraries listed below
Sorting:
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆21Updated 6 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- Telco training☆26Updated 7 years ago
- ☆13Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 7 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- ☆28Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- ☆101Updated 4 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- ☆25Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- ☆12Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- ☆26Updated last month
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Updated 8 years ago