merces / repogetLinks
git clone all repositories and gists from a given GitHub username
☆32Updated 3 years ago
Alternatives and similar repositories for repoget
Users that are interested in repoget are comparing it to the libraries listed below
Sorting:
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- ☆8Updated 2 years ago
- Presentations in different conferences☆35Updated 5 years ago
- A command line Swiss army knife for string and number conversions☆18Updated 5 years ago
- ☆19Updated 10 years ago
- [- mxmap -]☆11Updated last month
- cuz life is scriptable...☆26Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 3 months ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A collection of shellcodes☆69Updated 13 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated last month
- Scanner de vulnerabilidades Web.☆13Updated 9 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- ☆14Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Rex library for various exploitation helpers☆22Updated last month
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- ☆10Updated 2 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago