Presentations in different conferences
☆37Oct 17, 2019Updated 6 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- cross site scripting framework plugin for metasploit☆17Aug 23, 2012Updated 13 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- php tool for network scanning☆20May 7, 2015Updated 10 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Feb 5, 2018Updated 8 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- OS X rootkit loader version #1☆18Apr 10, 2015Updated 10 years ago
- 基于深度学习的cms识别 训练集☆16Sep 22, 2018Updated 7 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 14 years ago
- libssh CVE-2018-10933☆21Oct 20, 2018Updated 7 years ago
- when pass change ,send the pass to remote host☆20Jan 19, 2020Updated 6 years ago
- AST - Extractor for LLVM☆18Feb 23, 2021Updated 5 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- A kernel extension and userland daemon to patch applications☆103Sep 30, 2013Updated 12 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Jun 26, 2019Updated 6 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- vulhub下载器,可则需下载对应环境☆23Sep 19, 2018Updated 7 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- ☆19Aug 1, 2019Updated 6 years ago
- A curated list of websites and apps to help you practice hacking☆23Oct 15, 2019Updated 6 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- ☆18Oct 30, 2017Updated 8 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- Win32k Elevation of Privilege Poc☆24May 17, 2019Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- git clone all repositories and gists from a given GitHub username☆32Nov 15, 2025Updated 3 months ago