buffer overflow examples
☆23Dec 20, 2017Updated 8 years ago
Alternatives and similar repositories for bovrflow
Users that are interested in bovrflow are comparing it to the libraries listed below
Sorting:
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- site source jivoi.github.io☆22Nov 7, 2022Updated 3 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- ☆15May 17, 2018Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago
- ☆17Mar 10, 2018Updated 7 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- ☆14Mar 16, 2024Updated last year
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 10 months ago
- your offsec knowledge☆484Oct 9, 2019Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Admin Panel Finder☆16Jan 25, 2022Updated 4 years ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆64Feb 5, 2026Updated last month
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- Detect HTTP packet and inject redirect packet☆14Mar 1, 2018Updated 8 years ago