public-pentesting-reports
☆12Aug 23, 2016Updated 9 years ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below
Sorting:
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year
- ☆21Jul 6, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- Writeup for HackerOne H1-415 2020 CTF☆32Feb 3, 2020Updated 6 years ago
- just a bunch of vulnerable web pages for demo☆11Jun 6, 2019Updated 6 years ago
- Communication Relay by creating a WiFi Mesh Network using ROS, and using that network for Data Telemetry, with Telemetry radios ( Ubiquit…☆11Dec 18, 2018Updated 7 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- WSO SHELL , wso shell , WSO.php , wso.php , webshell , wso-shell веб-шелл , шелл , WSO2.5 , WSO2.5.1 , WSO2.php , Shell download, C99 , …☆10Jun 25, 2016Updated 9 years ago
- Some of my crypto challenges☆11Jun 21, 2020Updated 5 years ago
- A c++ implementation of the Two-Pass Pairing Heap data structure.☆11Oct 9, 2016Updated 9 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Veracruz branches of https://gitlab.com/arm-research/security/icecap/icecap☆19Jan 22, 2024Updated 2 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Sep 26, 2016Updated 9 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 3 months ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- macOS Monterey compatible OpenCore files for Lenovo ThinkCentre M910q/M710q☆14Sep 18, 2022Updated 3 years ago
- Grazyna the polish irc bot☆11Jul 6, 2022Updated 3 years ago
- the rounding error tool 🚩☆14May 16, 2025Updated 9 months ago
- Generate CPG for multiple languages for code and threat analysis☆11Sep 22, 2023Updated 2 years ago
- A curated list of awesome Arch-related projects,softwares and resources.☆16May 9, 2021Updated 4 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 7 years ago
- Passive IP recon tool using Shodan API to gather metadata, vulnerabilities, and CVE information for analysis.☆15Mar 5, 2025Updated 11 months ago
- Slides and demo code for past presentations☆12Feb 17, 2022Updated 4 years ago
- ☆11Sep 12, 2022Updated 3 years ago
- Quick deployment for LEMP / LAMP on Ubuntu.☆13May 9, 2023Updated 2 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Nov 8, 2019Updated 6 years ago
- Plugin for Reveal.js to use ALT + ARROWS to navigate☆10Jan 5, 2018Updated 8 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- ☆10Feb 22, 2023Updated 3 years ago
- Resk is a robust Python library designed to enhance security and manage context when interacting with LLMs. It provides a protective …☆16Dec 19, 2025Updated 2 months ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated last year