gynvael / random-stuffLinks
Random tools, code snippets, etc. No guarantee that any of this stuff works.
☆51Updated last year
Alternatives and similar repositories for random-stuff
Users that are interested in random-stuff are comparing it to the libraries listed below
Sorting:
- SSD Challenges☆47Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- Vulnerabilities, exploits, and PoCs☆36Updated this week
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆29Updated last year
- Binary Golf Library☆62Updated 4 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- ☆18Updated 5 years ago
- ☆38Updated this week
- CVE's we discovered along the way☆17Updated 3 years ago
- ☆55Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- ☆48Updated last year
- ☆13Updated 4 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆50Updated 2 months ago
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated this week
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 5 months ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆26Updated 5 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- A/D CTF services developed for ECSC 2022☆12Updated 2 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago