jivoi / Writing-Your-First-ExploitLinks
☆22Updated 9 years ago
Alternatives and similar repositories for Writing-Your-First-Exploit
Users that are interested in Writing-Your-First-Exploit are comparing it to the libraries listed below
Sorting:
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- buffer overflow examples☆22Updated 7 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆16Updated 4 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- only for 31337☆24Updated 9 years ago
- A collection of open source and commercial tools that aid in red team operations.☆10Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- ☆33Updated 10 months ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A curated list of awesome infosec resources.☆31Updated 10 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Repository of tools used in my blog☆52Updated last year
- Journey to Try Harder !!!☆32Updated 6 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Useful commands for pentesting Linux and Windows systems☆14Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- OSINT tool for discovering confidential data leaked on Github.☆51Updated 2 years ago
- Use Tor for anonymous scanning with nmap☆87Updated 10 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- ☆25Updated 5 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆30Updated 6 years ago