☆23Jun 28, 2016Updated 9 years ago
Alternatives and similar repositories for Writing-Your-First-Exploit
Users that are interested in Writing-Your-First-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- buffer overflow examples☆24Dec 20, 2017Updated 8 years ago
- devops scripts☆34Dec 8, 2016Updated 9 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆95Jun 19, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- your offsec knowledge☆487Oct 9, 2019Updated 6 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- just for fun ¯\_(ツ)_/¯☆281Sep 21, 2016Updated 9 years ago
- site source jivoi.github.io☆23Nov 7, 2022Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- VAMPY - Minimal tool for RAM dumping.☆10Jul 1, 2017Updated 8 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- open source society university☆32Jun 22, 2016Updated 9 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 8 months ago
- certgrep is a cross-platform command line tool that extracts SSL certificates from either a network interface or a local PCAP file.☆18Nov 12, 2021Updated 4 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Combines the speed of masscan with the reliability and detailed enumeration of nmap☆17Aug 16, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- bot net ufonet con ia☆12Jul 7, 2024Updated last year
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆16Mar 31, 2017Updated 9 years ago
- A list of GitHub accounts that you will find useful for OSINT.☆46Oct 12, 2025Updated 7 months ago
- A shell script for running lightning talks with a cow as a compere.☆15Jun 5, 2020Updated 5 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- TL-WR841N Router Hardware Hacking - Reversing and Backdooring☆40Aug 1, 2023Updated 2 years ago
- ☆18Feb 16, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- All the data about Pyvo meetups / Všechna data o Pyvo srazech☆18May 12, 2026Updated last week
- Recreating Chrome's Dino T-Rex game in Unity. Educational focus on game dev principles, Git, and GitHub integration. Non-profit, learning…☆18Aug 1, 2024Updated last year
- ☆12May 21, 2019Updated 7 years ago
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated last month
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- A weaponized technique for SSH to accept an inserted public/private key. Useful for red team effects.☆15Mar 27, 2020Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago