luker983 / nsa-codebreaker-2019Links
NSA Codebreaker Challenge 2019 write-ups.
☆21Updated 5 years ago
Alternatives and similar repositories for nsa-codebreaker-2019
Users that are interested in nsa-codebreaker-2019 are comparing it to the libraries listed below
Sorting:
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- I'll post my custom shellcode I make here!☆22Updated 6 years ago
- ☆122Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- WIP - Revamped Alfred [2.0]☆40Updated 7 months ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- ☆102Updated 6 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Updated 2 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Loot email addresses from commit entries☆56Updated 3 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 6 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- No-Script Automation Tool☆56Updated 7 years ago
- Small CTF challenges running on Docker☆158Updated 7 years ago
- ☆58Updated 4 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Red Team Resources☆60Updated 7 years ago
- ☆182Updated 5 years ago
- ☆116Updated 6 months ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago