The Dirty Secrets They Didn't Teach You In Pentesting Class
☆13Oct 5, 2011Updated 14 years ago
Alternatives and similar repositories for Not-In-Pentesting-Class
Users that are interested in Not-In-Pentesting-Class are comparing it to the libraries listed below
Sorting:
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Apr 6, 2014Updated 11 years ago
- A small Windows desktop application to help D&D 5e Dungeon Masters keep track of their characters stats.☆10Jan 28, 2017Updated 9 years ago
- Simple C# app to demonstrate an implementation of signed license keys☆12Jul 30, 2013Updated 12 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Random Code☆25Apr 18, 2011Updated 14 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- BurpJDSer-ng☆29Updated this week
- Knowledge Database for OCamlPro's version of OCaml on Windows☆33Jan 13, 2016Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Feb 1, 2019Updated 7 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- IDA Terminal☆17Feb 27, 2026Updated 3 weeks ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- OpenVG 1.1☆35May 31, 2016Updated 9 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 11 years ago
- HAPI Client for PHP.☆14Jan 6, 2021Updated 5 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Setup Ghidra environment for GitHub Actions☆16Updated this week
- Hook libc syscalls on Mac OS X☆23Jan 25, 2017Updated 9 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- Python module wrapping Bindiff usage into a Python API.☆22Jan 20, 2026Updated 2 months ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- A simple personal Telegram bot plugins based.☆14Feb 10, 2016Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 2 years ago
- Fast, zero-copy HTML Parser written in Rust☆24Dec 6, 2025Updated 3 months ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 8 months ago
- Gem in a Box, secured and audited.☆10Jan 4, 2018Updated 8 years ago
- Framework for in-VM test execution and monitoring, inspired by Sandsifter☆15Mar 12, 2026Updated last week
- Example for casbin-spring-boot-starter☆14Mar 1, 2025Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago