paulveillard / cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆23Updated 2 years ago
Alternatives and similar repositories for cybersecurity-exploit-development:
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- New Framework Red Team Operations☆17Updated 3 years ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- ☆19Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- My journey and notes on learning Offensive Security from the ground up☆17Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 9 months ago
- Personal notes from Red teamer for Blue/Red/Purple.☆53Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- A Red Teaming tool focused on profiling the target.☆26Updated 9 months ago
- Challenge Python☆19Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Simple recon tool automates your recon process☆16Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 9 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Sniffing out well-known threat groups☆28Updated 7 months ago
- C2Matrix Automation☆12Updated last year