hong6914 / awesome_software_securitiesLinks
Sites and URLs on software and securities that I hope to learn from you guys
☆43Updated 4 years ago
Alternatives and similar repositories for awesome_software_securities
Users that are interested in awesome_software_securities are comparing it to the libraries listed below
Sorting:
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Internet-of-Things (IoT) hacking lab exercise as showcased at RSA 2018, Hack NYC, and Hack the Capital☆35Updated 6 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Awesome Hacking☆20Updated 7 years ago
- HTML5 Training material for Attack and Secure training sessions.☆43Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- ☆17Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Updated 8 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- ☆70Updated 4 months ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Repo for the Gitbook Practical Hacking☆106Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 5 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Security checks for your researches☆34Updated 5 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Simple reverse shell over Slack☆56Updated 4 years ago