ic4rta / Guia-MalDev
Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas
☆21Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for Guia-MalDev
- RSA cryptosystem implementation in Python.☆10Updated 5 months ago
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆18Updated last week
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆36Updated 4 months ago
- BSPWM para Kali personalizado con un tema de pacman, perfecto para resolver maquinas en HTB☆91Updated last year
- Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.☆22Updated last year
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆22Updated 3 months ago
- Local File Inclusion Enumeration (PoC)☆60Updated 4 months ago
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas☆52Updated last month
- VulNyx is a free platform for hackers where you can learn & practice cybersecurity with our vulnerable virtual machines.☆40Updated 6 months ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Updated 8 months ago
- my kali desktop setup☆264Updated 5 months ago
- Local File Inclusion To Remote Command Execution (PoC)☆48Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆154Updated 9 months ago
- ☆9Updated last week
- Script hecho en bash para realizar un ataque de fuerza bruta a un usuario de un sistema Linux.☆41Updated 6 months ago
- NazunaRansom, ransomware inspirado en mi waifu☆12Updated 7 months ago
- HTB Certified Penetration Testing Specialist CPTS Study☆65Updated last year
- ☆29Updated 2 weeks ago
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYS…☆335Updated 3 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆304Updated 2 months ago
- ☆60Updated last year
- Repo containing cracked red teaming tools.☆124Updated 4 months ago
- Recolored Kali Linux wallpapers☆101Updated 5 months ago
- Penetration Testing Student version 2 simple condensed NOTES for quick recap☆169Updated 2 years ago
- 🧑🏻💻 Professional bspwm desktop environment for kali linux for hacking, of all kinds, with custom shortcuts, scripts, s4vitar configur…☆123Updated 2 months ago
- CVE-2024-21413 PoC for THM Lab☆48Updated 8 months ago
- Herramienta Python para obtener información de redes y explorar seguridad de redes.☆35Updated 4 months ago
- Configuration files for desktop environment☆24Updated 9 months ago
- Bash script that automates the setup of a professional hacking environment for Kali Linux using the tiled window manager bspwm.☆334Updated 4 months ago
- WonderCMS RCE CVE-2023-41425☆14Updated 3 months ago