linuxjustin / PentestLinks
☆7Updated 7 years ago
Alternatives and similar repositories for Pentest
Users that are interested in Pentest are comparing it to the libraries listed below
Sorting:
- Solutions for http://hackthiscontract.io☆8Updated 7 years ago
- linux rootkit☆160Updated 7 years ago
- shell backdoor website☆9Updated 6 years ago
- miscellaneous handy pentesting tools☆63Updated 4 years ago
- my simple perl5 scripts☆10Updated 8 years ago
- Published vulnerabilities and exploits.☆56Updated 2 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- ☆138Updated 3 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆77Updated 5 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Kindly Win x86/x64 DLL Injector☆16Updated 5 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- simple shellcode generator☆113Updated 8 years ago
- This is a linux rootkit using many of the techniques described on☆166Updated 5 years ago
- ☆141Updated 8 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆102Updated 4 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆159Updated 4 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"☆74Updated 11 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆90Updated 8 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- ☆129Updated 10 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago