Book for Pentesting format pdf
☆22Mar 25, 2022Updated 3 years ago
Alternatives and similar repositories for Book_Pentesting
Users that are interested in Book_Pentesting are comparing it to the libraries listed below
Sorting:
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- A simple DNS exfiltration script☆11Apr 17, 2023Updated 2 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Pseudo 3D racing game built with Reprocessing☆12Apr 3, 2024Updated last year
- ☆20Feb 23, 2019Updated 7 years ago
- Use LLMs to clean your gmail inbox☆20Dec 23, 2023Updated 2 years ago
- ☆15Aug 8, 2020Updated 5 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- RekSai 多个工具的功能结合起来,然后自动信息收集,保存结果☆11Nov 10, 2020Updated 5 years ago
- VFMD (Vanilla-Flavoured Markdown) parser for Reason☆13Sep 16, 2021Updated 4 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- ☆14May 11, 2021Updated 4 years ago
- Lukin CRA and ReScript Template☆17Dec 10, 2020Updated 5 years ago
- ☆15Aug 13, 2021Updated 4 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- ☆13Jul 16, 2021Updated 4 years ago
- CVE-2021-40438 exploit PoC with Docker setup.☆12Oct 24, 2021Updated 4 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆13Sep 2, 2024Updated last year
- PIX dashboard☆13Jan 6, 2023Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Jul 19, 2024Updated last year
- Jane Street's `ppx_let` repackaged for `npm`☆16Sep 7, 2020Updated 5 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- Algebraic Subtyping typechecking algorithms implemented in Erlang☆10Oct 13, 2021Updated 4 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Cross-platform high-performance vector and matrix math for OpenGL☆18Feb 25, 2020Updated 6 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago