☆14Aug 12, 2015Updated 10 years ago
Alternatives and similar repositories for SLAE
Users that are interested in SLAE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Created by David Maloney via the GitHub Connector☆12Mar 27, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Archive of Metasploit Framework v3 (Pre-Rapid7)☆10Aug 24, 2014Updated 11 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago
- Set of Minimal C Utilities☆16Aug 21, 2015Updated 10 years ago
- Code injection + payload communications for OSX (incl. sandboxed apps)☆24Sep 24, 2014Updated 11 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Rex library for text generation and manipulation☆21Updated this week
- Angr integration with Cutter's debugger☆37Feb 4, 2020Updated 6 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- English translation of @vulhub - Docker-Compose files for creating vulnerable environments. THIS PROJECT HAS BEEN ADDED WITH THE OFFICAL …☆11Sep 5, 2018Updated 7 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Feb 20, 2014Updated 12 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Apr 12, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Dec 23, 2025Updated 3 months ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- CEF plugin for audisp (Linux Audit)☆23Aug 19, 2016Updated 9 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Linux Local Enumeration Script☆79Jul 17, 2020Updated 5 years ago
- ☆11Nov 20, 2017Updated 8 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- Linux rootkit and detection examples☆32Jan 3, 2016Updated 10 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Development repository for the ossec cookbook☆46Mar 2, 2026Updated last month