mindcrypt / polyglotLinks
A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, steganography, red team)
☆114Updated 4 years ago
Alternatives and similar repositories for polyglot
Users that are interested in polyglot are comparing it to the libraries listed below
Sorting:
- Run several volatility plugins at the same time☆115Updated 3 years ago
- Practice Labs☆101Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- For my Try Hack Me room: Intro To Pwntools☆30Updated 4 years ago
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- ☆62Updated 3 years ago
- An arXiv for, what I think, are the finest in hacker works☆125Updated 11 months ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- 👹☆57Updated 4 years ago
- A curated list of resources for the OSED journey.☆69Updated 3 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆88Updated 5 months ago
- ☆195Updated last year
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 7 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆166Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- ☆116Updated 2 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆156Updated last month
- Gonna share my writeups and resources here☆68Updated 10 months ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- Upload files done during my research.☆166Updated 7 months ago
- Windows Kernel Exploits☆69Updated 8 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆47Updated 2 years ago
- Posts about different topics☆40Updated 3 months ago
- A series of writes about “Binary Exploitation”.☆84Updated 2 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- The best resources for learning exploit development☆120Updated 6 years ago
- ☆61Updated 3 years ago