nachash / htp-zinesLinks
A collection of Hack The Planet's zines.
☆72Updated 9 years ago
Alternatives and similar repositories for htp-zines
Users that are interested in htp-zines are comparing it to the libraries listed below
Sorting:
- Useful books, links, blogs, etc.☆14Updated 7 years ago
- Twitter as an extra entropy source☆104Updated 7 years ago
- Hacker OPSEC☆99Updated 7 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- The Zonefile Transfer Toolkit☆28Updated 8 months ago
- ☆18Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Network based protocol fuzzer☆75Updated 3 years ago
- File transfer via DNS☆74Updated 8 years ago
- simple shellcode generator☆114Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Copy of the contents at phrack.com☆40Updated 8 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Automated OpenSSH hardening☆42Updated 8 years ago
- Airprobe for frequency hopping GSM channels☆30Updated 11 years ago
- Learn the very basics of different languages☆49Updated 7 months ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- ☆65Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago