maxrodrigo / Hacking-The-Art-of-ExploitationView external linksLinks
Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson
☆21Mar 24, 2020Updated 5 years ago
Alternatives and similar repositories for Hacking-The-Art-of-Exploitation
Users that are interested in Hacking-The-Art-of-Exploitation are comparing it to the libraries listed below
Sorting:
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 2 years ago
- Corrupted files generator. Random bits flipper.☆27Oct 30, 2023Updated 2 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated last year
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated last year
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- ☆25Dec 28, 2023Updated 2 years ago
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆28May 31, 2023Updated 2 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆13Dec 21, 2023Updated 2 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Import Device Tree Information onto your Ghidra memory map☆23Feb 3, 2026Updated 2 weeks ago
- Bash script that backs up Docker images or containers, and then scans them using VirusTotal.☆16May 2, 2023Updated 2 years ago
- Python tool to compare and analyse Nmap XML files to create a spreadsheet with results. Can also be used to create a markdown report usin…☆24Nov 12, 2024Updated last year
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 9 months ago
- JSNotify is a Python script designed to monitor JavaScript files in a specified directory for changes. This tool can be used by developer…☆18Nov 15, 2023Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Jul 1, 2024Updated last year
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Updated this week
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- ☆20Jan 9, 2024Updated 2 years ago