Guía introductoria a la escritura de exploits
☆70Mar 2, 2021Updated 5 years ago
Alternatives and similar repositories for guia-escritura-exploits
Users that are interested in guia-escritura-exploits are comparing it to the libraries listed below
Sorting:
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- Spanish translation of Silvanus P. Thompson's classic textbook Calculus Made Easy (1911)☆20Sep 3, 2012Updated 13 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- ☆24Jul 14, 2021Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Customized docker images generation toolkit☆25Oct 14, 2021Updated 4 years ago
- Repo for Coursera's Data Science Specialization.☆15Oct 1, 2020Updated 5 years ago
- Hacking Tools Z0172CK☆30Jul 11, 2023Updated 2 years ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Sep 21, 2024Updated last year
- A web3 utilities toolbox☆11Aug 11, 2023Updated 2 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Jul 5, 2020Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- ☆36Apr 1, 2021Updated 4 years ago
- bdldr is an unofficial engine loader for Bitdefender ® for Linux☆45Mar 12, 2016Updated 9 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- this tool will give you freedom to crack wpa-wpa2 passwords with ease and also in a efficient way without any hassle.☆11May 25, 2019Updated 6 years ago
- Online client-side manager for secure storage and sharing of secrets.☆41Feb 21, 2022Updated 4 years ago
- ☆44Nov 27, 2023Updated 2 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ASP.Net Core version of the Switch Lan Play Relay server, originally written by SpaceMeowX2 in NodeJs/Typescript which can be found here:…☆10Mar 26, 2020Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- Patreon v2 api c# client☆12Jul 9, 2024Updated last year
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 4 months ago
- ERPNext / Frappe Framework MariaDB configuration file☆16Jun 22, 2021Updated 4 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- Read-only mirror of https://gitlab.gnome.org/GNOME/gcr☆12Feb 27, 2026Updated last week