ameserole / AkesoLinks
A Platform for Testing Secure Coding/Config
☆19Updated 7 years ago
Alternatives and similar repositories for Akeso
Users that are interested in Akeso are comparing it to the libraries listed below
Sorting:
- Telco training☆26Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last week
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ☆21Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- ☆28Updated 8 years ago
- ☆53Updated 6 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆26Updated 2 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- ☆13Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ☆36Updated 6 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Office 365 MFA capture toolkit☆13Updated 8 years ago
- ☆25Updated 6 years ago
- ☆101Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago