☆198Jan 21, 2016Updated 10 years ago
Alternatives and similar repositories for LibTech-Auditing-Cheatsheet
Users that are interested in LibTech-Auditing-Cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆56Jan 25, 2016Updated 10 years ago
- ☆34Aug 5, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- iSEC Partners' research publications☆76Jul 8, 2016Updated 9 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- jPurify☆64Feb 16, 2017Updated 9 years ago
- JavaScript parser and sandbox☆80Sep 13, 2016Updated 9 years ago
- SSH Based Remote Administration Tool☆103Jul 9, 2015Updated 10 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Prevent Apple to mess with keys☆67Oct 10, 2013Updated 12 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- a collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, hand…☆30Aug 19, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- HACL*, a formally verified cryptographic library for Rust (binding to hacl-c).☆30Feb 29, 2020Updated 6 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- ☆18Jun 21, 2019Updated 6 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- A dynamic data race detector for programs☆15Jan 2, 2016Updated 10 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- The Digital First Aid Kit has moved to Gitlab:☆111Jul 19, 2019Updated 6 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- RoR / Devise PoC in memory Backdoor☆29Dec 14, 2014Updated 11 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Just an experiment with hash cracking :) few password lists along with some good password cracking rule sets.☆13Feb 29, 2020Updated 6 years ago
- My masters degree dissertation for ISG, Royal Holloway (2011) on evolutionary fuzzing☆11Jul 22, 2016Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Sep 28, 2022Updated 3 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago