mindcrypt / polyglotLinks
A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, steganography, red team)
☆106Updated 4 years ago
Alternatives and similar repositories for polyglot
Users that are interested in polyglot are comparing it to the libraries listed below
Sorting:
- A spiky Australian bug hunter☆29Updated 4 years ago
- ☆27Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- esoteric☆54Updated 4 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- 👹☆56Updated 3 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated 10 months ago
- A curated list of resources for the OSED journey.☆63Updated 3 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆141Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆171Updated 5 years ago
- Workshop given at Hack in Paris 2019☆122Updated last year
- For my Try Hack Me room: Intro To Pwntools☆27Updated 3 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆89Updated 6 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- BurpSuite using the document and some extensions☆69Updated 4 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- ☆60Updated 3 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Fast and intuitive manager for multiple reverse shells☆85Updated 6 months ago
- Windows Kernel Exploits☆66Updated 7 years ago
- ☆51Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year