ricardojoserf / slae32
The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assembly language for the Intel Architecture (IA-32) family of processors on the Linux platform and applying it to Infosec
☆17Updated 6 years ago
Alternatives and similar repositories for slae32:
Users that are interested in slae32 are comparing it to the libraries listed below
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Stuff for OSWP Exam - Try harder ^^☆9Updated 7 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆32Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆24Updated 4 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆17Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆79Updated last year
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- Presentaciones de congresos☆52Updated 10 months ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- A tool to password spray Jenkins instances☆56Updated 5 years ago
- ☆15Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago