My Quick Note of BlackHat 2015 Arsenal
☆26Aug 13, 2015Updated 10 years ago
Alternatives and similar repositories for BlackHat2015Arsenal
Users that are interested in BlackHat2015Arsenal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- ☆16Apr 16, 2015Updated 11 years ago
- Control thousands of WS2811/2812 LEDs at video refresh speeds☆12May 5, 2015Updated 10 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆80Apr 17, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PacketSled's Bro AMQP Writer Plugin☆11Aug 5, 2016Updated 9 years ago
- Software, firmware and hardware designs for Ubertooth☆19Aug 30, 2015Updated 10 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 11 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 10 years ago
- ☆12Apr 22, 2022Updated 3 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- A regex based source code scanner.☆128Apr 8, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- SNES for MiSTer☆16Sep 5, 2025Updated 7 months ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Limit user logins by IP using pam_exec module☆12Aug 21, 2016Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- ☆39Apr 24, 2019Updated 6 years ago
- ☆12Feb 4, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Store arbitrary data on Flickr☆272May 28, 2013Updated 12 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- random scripts for random things☆13Mar 3, 2026Updated last month
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago