Python3 Scripts for OSCP buffer overflow exploitation
☆12May 12, 2021Updated 4 years ago
Alternatives and similar repositories for OSCP-Buffer-Overflow
Users that are interested in OSCP-Buffer-Overflow are comparing it to the libraries listed below
Sorting:
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 3 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 9 months ago
- Custom config.☆19May 17, 2023Updated 2 years ago
- Creating CS:GO server with skins, ws, gloves, knife, rank, rs, etc. both with a bash file and using a docker file.☆15Sep 11, 2022Updated 3 years ago
- A list of cyber security companies or companies that have their own Cyber Security Department.☆21Jun 10, 2024Updated last year
- Counter Strike, but chickens only.☆16Jul 2, 2017Updated 8 years ago
- Cheatsheets☆19Jul 4, 2022Updated 3 years ago
- Automatically find certain gems in King of Thieves☆10May 15, 2025Updated 9 months ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Apr 4, 2019Updated 6 years ago
- Repository to put my notes related to OSCP certification☆26Aug 29, 2019Updated 6 years ago
- ☆23Feb 15, 2021Updated 5 years ago
- Tips and tricks on reversing and exploiting Windows using free and easy to get tools.☆33Mar 21, 2023Updated 2 years ago
- ☆32May 16, 2018Updated 7 years ago
- ☆10Jan 9, 2026Updated last month
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 5 years ago
- Election results data reported for Pakistan 2018 general elections☆11Sep 5, 2018Updated 7 years ago
- Rekhta Dictionary Extension code☆10Aug 9, 2022Updated 3 years ago
- Automated market maker algorithms, deployment fixtures and controls for Lyra V2 markets☆18Feb 23, 2026Updated last week
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Swarm node that actually works. Built in Rust because Go wasn't cutting it for real decentralization.☆17Feb 3, 2026Updated last month
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Linux pentest tools☆89Nov 4, 2019Updated 6 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- External Penetration Testing - Holo Corporate Network - TryHackMe - Holo Network☆10Oct 3, 2021Updated 4 years ago
- you idiots☆11Oct 30, 2024Updated last year
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- ☆12Apr 20, 2025Updated 10 months ago
- A simple remote scanner for Sitecore CMS☆13May 28, 2024Updated last year
- Multithreaded interactive Mandelbrot and Julia viewer built via a library on OpenGL☆11Apr 30, 2019Updated 6 years ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Herramienta para escanear toda la información previa y necesaria antes de llevar a cabo cualquier tipo de auditoría.☆13Jul 25, 2022Updated 3 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- ☆11Jun 14, 2022Updated 3 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago