The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec
☆22Mar 31, 2019Updated 7 years ago
Alternatives and similar repositories for slae32
Users that are interested in slae32 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 10 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆15May 1, 2020Updated 5 years ago
- All Apprentice and Practitioner-level Portswigger labs☆34May 18, 2023Updated 2 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- ☆16Mar 6, 2019Updated 7 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- A tool for patching/injecting code into elf binaries.☆15Sep 27, 2012Updated 13 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- BypassCredGuard CS BOF☆53Jan 23, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- You don't need wires to be connected☆43Apr 8, 2020Updated 6 years ago
- Challenge Python☆19Apr 26, 2023Updated 3 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- The Router Exploitation Framework☆12Nov 10, 2017Updated 8 years ago
- Resolve offsets, gadgets and symbols from NTKernel☆61Jan 15, 2026Updated 3 months ago
- This is a collection of Worms for educational purposes☆36Jul 17, 2025Updated 9 months ago
- ☆65Jun 5, 2021Updated 4 years ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated last year
- ☆20Sep 2, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Vulnserver exploits☆14May 1, 2020Updated 5 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆12Jan 13, 2022Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Exploits written while preparing for the OSED exam☆24Apr 30, 2024Updated 2 years ago
- ☆11Mar 28, 2021Updated 5 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year