larryv / learn-c-the-hard-way
A few exercises from Zed Shaw’s “Learn C the Hard Way”
☆22Updated 5 years ago
Alternatives and similar repositories for learn-c-the-hard-way:
Users that are interested in learn-c-the-hard-way are comparing it to the libraries listed below
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆17Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 6 years ago
- Various pentest scripts☆14Updated 10 years ago
- Universal stack-based buffer overfow exploitation tool☆22Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- This is sed (unix stream editor) cheat sheet.☆45Updated 15 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- DirBuster successor in Erlang☆37Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 4 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Script for searching the extracted firmware file system for goodies!☆9Updated 8 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆11Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 8 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- _Working_ examples from Grayhat Python☆13Updated 9 years ago
- Shovels a shell back to you on a specified port☆9Updated 4 years ago
- Malware analysis tool☆22Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Scripts for Kali on Android.☆8Updated 10 years ago