maycon / talks
☆10Updated 2 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- laboratório sobre buffer overflows☆15Updated 8 years ago
- Spy Agency Teasing☆14Updated 10 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- ☆31Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 3 months ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- ☆19Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆29Updated 8 years ago
- Scanner de vulnerabilidades Web.☆13Updated 9 years ago
- public bugs/proof of concepts☆48Updated 4 years ago
- A tool to download malwares☆16Updated last year
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 9 years ago
- ☆22Updated 7 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ☆51Updated 8 years ago