☆20Feb 28, 2018Updated 7 years ago
Alternatives and similar repositories for slides
Users that are interested in slides are comparing it to the libraries listed below
Sorting:
- ☆14Jul 8, 2019Updated 6 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- UPDATED: All the action is at https://github.com/xsscx/srd☆12Jul 12, 2021Updated 4 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- CSAW CTF 2016 Finals☆13Dec 1, 2016Updated 9 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- This is an OllyDbg plugin which will help you to import map files exported by IDA, Dede, IDR, Microsoft and Borland linkers.☆22Aug 12, 2015Updated 10 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- ☆46May 15, 2016Updated 9 years ago
- A neural network using fuzzing-style feedback rather than back-propagation☆18Aug 12, 2020Updated 5 years ago
- A collection of published exploits and proof-of-concept code.☆21Dec 19, 2017Updated 8 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- x86 Dynamic Binary Translator Library☆34Dec 19, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- Binary Ninja loader for A12 SEP firmware☆29Feb 4, 2021Updated 5 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago
- A simple API monitor for Windbg☆65Apr 22, 2017Updated 8 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago