brainsmoke / pub-archiveView external linksLinks
☆26Dec 8, 2025Updated 2 months ago
Alternatives and similar repositories for pub-archive
Users that are interested in pub-archive are comparing it to the libraries listed below
Sorting:
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Sectalks MEL0x14 CTF☆38Feb 11, 2018Updated 8 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Oct 31, 2014Updated 11 years ago
- Chrome extension to detect possible xsleaks☆12May 4, 2019Updated 6 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- My blog where I make a new coding project every Thursday.☆46Dec 2, 2025Updated 2 months ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- Pure Python parser for data encoded by .NET's BinaryFormatter☆54Sep 4, 2018Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Dec 28, 2018Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 6 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆24Aug 22, 2017Updated 8 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago