brainsmoke / pub-archiveLinks
☆26Updated last month
Alternatives and similar repositories for pub-archive
Users that are interested in pub-archive are comparing it to the libraries listed below
Sorting:
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- ☆101Updated 4 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- A shellcode testing harness.☆70Updated last year
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Generate pentest reports based on github issues.☆16Updated 3 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Format string exploit generation☆10Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- ☆21Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago