deFr0ggy / BOF-BasicsLinks
Learning material for completely newcomers in the field of BOFs
☆14Updated 5 years ago
Alternatives and similar repositories for BOF-Basics
Users that are interested in BOF-Basics are comparing it to the libraries listed below
Sorting:
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- ☆26Updated 6 years ago
- ☆15Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆26Updated 5 months ago
- Tools that trigger False Positive AV alerts☆50Updated 6 months ago
- This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.doc…☆33Updated 4 years ago
- material for exploit development☆17Updated 6 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Posts about different topics☆36Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- My collection of self-written exploits☆24Updated 3 years ago
- ☆36Updated 7 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆19Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Continuous kerberoast monitor☆45Updated last year
- A tool for auditing medical devices and healthcare infrastructure☆20Updated 2 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Simplified MITRE Use Cases, it describes the Attack and Detection☆46Updated 4 years ago