An Intro to Penetration Testing Workshop
☆15May 31, 2018Updated 7 years ago
Alternatives and similar repositories for r00tz2017
Users that are interested in r00tz2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- Cfm Shell v3.0 edition☆13Jun 16, 2013Updated 12 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- ☆17May 29, 2015Updated 10 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Nov 11, 2019Updated 6 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Cross-platform process dependency monitor with GUI☆10Feb 23, 2026Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆24Jan 3, 2020Updated 6 years ago
- ASYRV es una aplicación escrita en PHP/MySQL, con Servicios Web mal desarrollados(SOAP/REST/XML), esperando ayudar a los entusiastas de l…☆23Oct 13, 2018Updated 7 years ago
- …(⊙_⊙;)…☆56Mar 31, 2021Updated 4 years ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- linux lcx☆11Jul 18, 2016Updated 9 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- Piet language in Ruby☆13Nov 12, 2024Updated last year
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- MITRE ATT&CK Framework compliance dashboard and correlation searches that works with Splunk Enterprise Security and ES Content Update☆30Nov 7, 2025Updated 4 months ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- ☆13May 9, 2017Updated 8 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago