mindcrypt / polyglotLinks
A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, steganography, red team)
☆117Updated 4 years ago
Alternatives and similar repositories for polyglot
Users that are interested in polyglot are comparing it to the libraries listed below
Sorting:
- An arXiv for, what I think, are the finest in hacker works☆128Updated last year
- Run several volatility plugins at the same time☆117Updated 3 years ago
- A Python API for Hack the Box platform interaction☆64Updated 5 years ago
- RE / Binary Exploitation Resources☆74Updated 8 years ago
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆241Updated 2 years ago
- ☆199Updated last year
- Posts about different topics☆39Updated 5 months ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆90Updated last week
- A curated list of resources for the OSED journey.☆72Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Practice Labs☆104Updated 5 years ago
- Proof of Concept for CVE-2019-18634☆233Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆178Updated 5 years ago
- ☆64Updated 3 years ago
- Offline command line lookup utility for GTFOBins (https://github.com/GTFOBins/GTFOBins.github.io), LOLBAS (https://github.com/LOLBAS-Proj…☆284Updated 2 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Updated 3 years ago
- ☆27Updated 6 years ago
- Damn Vulnerable IoT Device☆214Updated last year
- 👹☆57Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 2 weeks ago
- A spiky Australian bug hunter☆30Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- The best resources for learning exploit development☆123Updated 6 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆155Updated 2 months ago
- Damn Vulnerable Thick Client App developed in C# .NET☆173Updated 2 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- Upload files done during my research.☆169Updated last month
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago