jivoi / Writing-Your-First-Exploit
☆20Updated 8 years ago
Alternatives and similar repositories for Writing-Your-First-Exploit:
Users that are interested in Writing-Your-First-Exploit are comparing it to the libraries listed below
- Penetration Testing/Security Cheatsheets☆58Updated 9 years ago
- buffer overflow examples☆22Updated 7 years ago
- openvpn server configs☆13Updated 8 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆13Updated 3 years ago
- only for 31337☆22Updated 8 years ago
- home! sweet home☆23Updated 5 years ago
- intrusion detection☆23Updated 7 years ago
- devops scripts☆31Updated 8 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- A curated list of awesome infosec resources.☆25Updated 9 years ago
- ☆24Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆80Updated 9 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆53Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- ☆13Updated 7 years ago
- ☆34Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 5 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆17Updated 7 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- site source jivoi.github.io☆22Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Red Team Tool Kit☆15Updated 6 years ago