gregkcarson / BigSecList
A large repository of links spanning all topics in information security.
☆13Updated 9 years ago
Alternatives and similar repositories for BigSecList:
Users that are interested in BigSecList are comparing it to the libraries listed below
- put this here because archival reasons.☆28Updated 7 years ago
- ☆14Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- ☆73Updated 2 years ago
- Simple DDE object detector☆56Updated 7 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- Mixing up CVE and MS like a pro☆24Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- ☆25Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- ☆50Updated 8 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆53Updated 8 years ago
- WhiteBox CMS analysis☆69Updated last year
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- An offensive Powershell console☆30Updated 9 years ago