☆14Aug 12, 2015Updated 10 years ago
Alternatives and similar repositories for SLAE
Users that are interested in SLAE are comparing it to the libraries listed below
Sorting:
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 14 years ago
- Angr integration with Cutter's debugger☆37Feb 4, 2020Updated 6 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- English translation of @vulhub - Docker-Compose files for creating vulnerable environments. THIS PROJECT HAS BEEN ADDED WITH THE OFFICAL …☆11Sep 5, 2018Updated 7 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Feb 20, 2014Updated 12 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Apr 12, 2016Updated 9 years ago
- Unix netcat(nc) in Python☆48Apr 16, 2019Updated 6 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Dec 23, 2025Updated 2 months ago
- Database extension (runtimes)☆20Jul 6, 2015Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 11 months ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- CEF plugin for audisp (Linux Audit)☆23Aug 19, 2016Updated 9 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- WebGoatPHP is a port of WebGoat to PHP and MySQL/SQLite databases.☆40Oct 12, 2016Updated 9 years ago
- ☆11Nov 20, 2017Updated 8 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Infinite relational model (IRM) for datamicroscopes☆14Oct 26, 2015Updated 10 years ago
- ☆14Dec 26, 2017Updated 8 years ago
- Development repository for the ossec cookbook☆45Mar 2, 2026Updated 2 weeks ago