ricardojoserf / slae32View external linksLinks
The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec
☆23Mar 31, 2019Updated 6 years ago
Alternatives and similar repositories for slae32
Users that are interested in slae32 are comparing it to the libraries listed below
Sorting:
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Feb 17, 2024Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆23Jun 14, 2023Updated 2 years ago
- All Apprentice and Practitioner-level Portswigger labs☆31May 18, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 7 months ago
- Toolkit to investigate the BitTorrent network.☆10Dec 19, 2023Updated 2 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 4 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- ☆66Jun 5, 2021Updated 4 years ago
- ☆16Mar 6, 2019Updated 6 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- You don't need wires to be connected☆42Apr 8, 2020Updated 5 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Tools for analyzing Windows containers and break container's isolation☆32Aug 2, 2022Updated 3 years ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Jun 2, 2025Updated 8 months ago
- php Non-AlphaNumeric Encoder☆21Apr 8, 2017Updated 8 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 10 months ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- Penetration testing course by Z0F.☆53Oct 6, 2021Updated 4 years ago
- Impersonate Tokens using only NTAPI functions☆83Apr 4, 2025Updated 10 months ago
- ☆11Mar 4, 2020Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆91Nov 6, 2025Updated 3 months ago
- Synced with SGX101 gitbook.☆31Dec 7, 2023Updated 2 years ago
- C++ Code☆11Aug 13, 2019Updated 6 years ago