m0nad / PapersLinks
☆19Updated 10 years ago
Alternatives and similar repositories for Papers
Users that are interested in Papers are comparing it to the libraries listed below
Sorting:
- Network based protocol fuzzer☆73Updated 3 years ago
- Exploits and research stuffs☆55Updated last year
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 5 months ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- ☆89Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A collection of shellcodes☆69Updated 13 years ago
- XXE vulnerability demo☆22Updated 11 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 4 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 6 years ago
- ☆53Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- A shellcode testing harness.☆69Updated last year