ricardojoserf / slae32Links
The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec
☆23Updated 6 years ago
Alternatives and similar repositories for slae32
Users that are interested in slae32 are comparing it to the libraries listed below
Sorting:
- Presentaciones de congresos☆55Updated last year
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- ☆49Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago
- ☆59Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated last year
- IAT Unhooking proof-of-concept☆33Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated this week
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 2 years ago
- Simple python script for AD enumeration☆31Updated 4 years ago
- Perform Windows domain enumeration via LDAP☆37Updated 3 years ago
- Talk slides and material☆37Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Tools that trigger False Positive AV alerts☆53Updated 11 months ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated 2 years ago