gsuberland / infosec-tricksLinks
Infosec tips and tricks
☆17Updated 7 years ago
Alternatives and similar repositories for infosec-tricks
Users that are interested in infosec-tricks are comparing it to the libraries listed below
Sorting:
- Private keys that have become public ...☆184Updated last month
- ☆25Updated 8 years ago
- ☆147Updated 9 years ago
- 34C3 Junior CTF pwnables☆118Updated 7 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 4 months ago
- Stargate☆95Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- ☆122Updated 7 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Red Team Resources☆60Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 5 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆49Updated 9 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 6 years ago
- Repository for Insomni'hack finals 2015☆22Updated 10 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Parse raw C# serialization : https://msdn.microsoft.com/en-us/library/cc236865.aspx☆32Updated 7 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- ☆24Updated 10 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- Big Iron Recon & Pwnage☆125Updated 4 years ago