filinpavel / whitehatLinks
☆21Updated 6 years ago
Alternatives and similar repositories for whitehat
Users that are interested in whitehat are comparing it to the libraries listed below
Sorting:
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- CTF Writeups☆16Updated 8 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- lkm rootkit☆15Updated 11 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆23Updated 11 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Updated 6 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Repository for penetration testing tools☆36Updated 5 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- Information Security News☆62Updated 2 years ago
- drivesploit-testing☆26Updated 15 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Exploits and research stuffs☆54Updated 3 months ago
- My metasploit modules☆11Updated 10 years ago
- Application for random attack on Green Petya's key☆25Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Updated 7 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Updated last year
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Updated 10 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago