ricardojoserf / slae32
The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec
☆17Updated 6 years ago
Alternatives and similar repositories for slae32:
Users that are interested in slae32 are comparing it to the libraries listed below
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated last year
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- ☆17Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆24Updated 4 years ago
- Presentaciones de congresos☆52Updated 10 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆20Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- ☆15Updated last year
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 5 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆32Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Stuff for OSWP Exam - Try harder ^^☆9Updated 7 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- ☆52Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆54Updated 3 years ago