markofu / hackeire
Challenges, notes & other stuff from the HackEire CTF.....
☆34Updated 8 years ago
Alternatives and similar repositories for hackeire:
Users that are interested in hackeire are comparing it to the libraries listed below
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆55Updated 4 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- A warehouse for your malware☆134Updated 11 years ago
- ☆74Updated 2 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last week
- Yara intergrated into BurpSuite☆46Updated 8 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 years ago
- ☆49Updated 9 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago