h2hconference / H2HCMagazineView external linksLinks
H2HC Magazine
☆120Apr 15, 2025Updated 9 months ago
Alternatives and similar repositories for H2HCMagazine
Users that are interested in H2HCMagazine are comparing it to the libraries listed below
Sorting:
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- OSINT Brazuca Posters é um repositório criado com intuito de organizar posters autorais dentro do projeto OSINT Brazuca.☆14Dec 13, 2023Updated 2 years ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆34Sep 5, 2021Updated 4 years ago
- ☆10Jan 24, 2026Updated 2 weeks ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 5 years ago
- Please, see README.md for further information.☆12May 16, 2025Updated 8 months ago
- Multiplatform CLI and GUI tool to show information about ELF files☆63Jul 1, 2025Updated 7 months ago
- [- mxmap -]☆11Apr 9, 2025Updated 10 months ago
- ☆13Feb 29, 2020Updated 5 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Feb 5, 2018Updated 8 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 6 months ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Organizar documentos sobre OSINT feitos em pt-br☆21Dec 20, 2023Updated 2 years ago
- A simple multiplatform command line search tool for Windows API.☆47Mar 7, 2025Updated 11 months ago
- Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.☆19Jul 21, 2023Updated 2 years ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Dec 17, 2024Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- Bot para interação com usuários e grupos no Telegram☆10Sep 1, 2021Updated 4 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆49Mar 25, 2022Updated 3 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Sep 29, 2023Updated 2 years ago
- PoC || GTFO Issues☆70Feb 12, 2020Updated 6 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆25Mar 18, 2021Updated 4 years ago
- Exploit development challenges!☆24Mar 19, 2023Updated 2 years ago
- Symbol hash for ELF files☆114Feb 9, 2022Updated 4 years ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- Versão PT-BR do hacktricks.☆44Nov 13, 2024Updated last year
- A decorator that helps you run two different versions of a function at the same time and track differences *without* breaking the current…☆11Jan 28, 2021Updated 5 years ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- De vez em quando eu volto para meus estudos de NLP e dados. Aqui está o andamento do estudo ;)☆13Dec 27, 2017Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- Livro: Engenharia Reversa - Fundamentos e Prática☆203Nov 14, 2025Updated 2 months ago
- ☆12Nov 22, 2024Updated last year
- ☆12Nov 17, 2020Updated 5 years ago
- ☆15Apr 13, 2021Updated 4 years ago