Collection of things made during my SLAE 32-bit journey
☆14Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for SLAE32
Users that are interested in SLAE32 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- Cfm Shell v3.0 edition☆13Jun 16, 2013Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Executables created while writing "Introduction to Manual Backdooring".☆81May 30, 2017Updated 8 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Learnings from OSCP and other random stuff.☆31Feb 28, 2024Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Alphanumeric Shellcode (x86) Encoder☆75Feb 24, 2022Updated 4 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Oct 16, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live☆24Dec 4, 2018Updated 7 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Brute forcer and shell deployer for WildFly☆99Mar 10, 2018Updated 8 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Ruby Regular Expression Helper Gem☆17Oct 30, 2016Updated 9 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- CVE-2018-8440 standalone exploit☆80Oct 31, 2018Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago