paulveillard / cybersecurity-exploit-development
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Exploit Development.
☆25Updated 2 years ago
Alternatives and similar repositories for cybersecurity-exploit-development:
Users that are interested in cybersecurity-exploit-development are comparing it to the libraries listed below
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 9 months ago
- ☆20Updated last year
- Challenge Python☆19Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ☆32Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆34Updated 3 weeks ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- Tactics, Techniques, and Procedures☆25Updated 3 months ago
- ☆10Updated 4 months ago
- Collection of Tools & Techniques for analyzing URLs☆31Updated last year
- ☆22Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated 11 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆23Updated last month
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆35Updated last year
- ☆22Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- ☆53Updated 4 months ago
- AppsecStudy - open-source elearning management system for information security☆9Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆11Updated 9 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆28Updated 3 weeks ago