☆14Aug 12, 2015Updated 10 years ago
Alternatives and similar repositories for SLAE
Users that are interested in SLAE are comparing it to the libraries listed below
Sorting:
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- CEF plugin for audisp (Linux Audit)☆23Aug 19, 2016Updated 9 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Development repository for the ossec cookbook☆44Feb 20, 2026Updated last week
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Linux Local Enumeration Script☆79Jul 17, 2020Updated 5 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Aug 26, 2020Updated 5 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Secure access cloud terraform provider☆13Updated this week
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆15Sep 4, 2024Updated last year
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- exfiltration/infiltration toolkit☆50Oct 31, 2024Updated last year
- PwnableWeb is a suite of web applications for use in information security training.☆87Jun 7, 2014Updated 11 years ago
- Pentest TeamCity using Metasploit☆45Feb 8, 2021Updated 5 years ago
- The iMC Portal login tool of GDPU☆10Nov 5, 2018Updated 7 years ago
- ☆11Nov 17, 2025Updated 3 months ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Consolidated demo and source links from Bryant Zadegan and Ryan Lester's Black Hat / DEF CON talk "Abusing Bleeding Edge Web Standards fo…☆11Aug 19, 2017Updated 8 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Visual Studio Code configuration files for development of VCV Rack☆16Feb 15, 2018Updated 8 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 10 months ago