m0nad / Papers
☆19Updated 10 years ago
Alternatives and similar repositories for Papers:
Users that are interested in Papers are comparing it to the libraries listed below
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 4 years ago
- a simple lib to help read and write in the memory of a linux process☆13Updated 5 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 3 weeks ago
- Protect your parents from phishing☆39Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- try privilege escalation changing sudo command☆119Updated 6 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Pwn2Win CTF 2017☆27Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- cuz life is scriptable...☆25Updated 8 years ago
- laboratório sobre buffer overflows☆15Updated 7 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Presentations in different conferences☆35Updated 5 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆19Updated 12 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- Security scanner tool for Plone CMS.☆19Updated 12 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 years ago
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Network based protocol fuzzer☆70Updated 3 years ago
- ☆10Updated last year
- XXE vulnerability demo☆22Updated 10 years ago