Container and files for a beginners workshop on writing Linux x86_64
ā25Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for x86_64_workshop
Users that are interested in x86_64_workshop are comparing it to the libraries listed below
Sorting:
- Scripts to make life easierā12Jun 16, 2020Updated 5 years ago
- š°A bash script to check if you have a gateway that could get you somewhere nice.ā15Dec 8, 2019Updated 6 years ago
- ā18Dec 4, 2018Updated 7 years ago
- ā17Oct 26, 2018Updated 7 years ago
- ā16Jul 5, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.ā15Apr 21, 2017Updated 8 years ago
- Custom scripts used during the scenarioā21Apr 5, 2021Updated 4 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utilityā44Jan 30, 2021Updated 5 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.ā21Mar 13, 2025Updated 11 months ago
- Python tool for kidnapping Chrome cookies from a MacOS targetā22Oct 5, 2022Updated 3 years ago
- Trainer(aimbot and esp) for Assault Cube on macOSā22Oct 16, 2019Updated 6 years ago
- Stuff for 4G routers presented at Defcon27ā24Aug 12, 2019Updated 6 years ago
- ā18May 9, 2020Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registryā86Mar 9, 2021Updated 4 years ago
- CVE-2019-16097 PoCā23Sep 19, 2019Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalationā26Feb 28, 2020Updated 6 years ago
- Simple S3 Bucket Testing Softwareā31Nov 4, 2021Updated 4 years ago
- CEF plugin for audisp (Linux Audit)ā23Aug 19, 2016Updated 9 years ago
- Code samples from Practical Binary Analysisā25May 23, 2020Updated 5 years ago
- lateral movement techniques that can be used during red team exercisesā273Jan 13, 2020Updated 6 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fitā29Dec 13, 2019Updated 6 years ago
- Some helpful Helm Charts for pentestersā38Jan 28, 2019Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other pā¦ā26Aug 22, 2017Updated 8 years ago
- Redis Security Map - Anti-hacking for Redisā31Mar 11, 2022Updated 3 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volumeā29Jan 1, 2024Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolā26Jun 8, 2017Updated 8 years ago
- A collection of scripts made duing my personal researchā29Sep 27, 2018Updated 7 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"ā31Oct 26, 2019Updated 6 years ago
- A command line tool and a library to generate TLS certificates for development purposes.ā36Jul 5, 2021Updated 4 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)ā32Apr 25, 2023Updated 2 years ago
- Enumerate your Kubernetes cluster with just 1 commandā11Updated this week
- ā67Dec 19, 2018Updated 7 years ago
- Samba, NFS shares spider and grepperā71Jul 11, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)ā30Mar 22, 2018Updated 7 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSLā41May 31, 2024Updated last year
- .NET 4.0 Remote Desktop Manager Password Gathererā81Sep 29, 2020Updated 5 years ago
- Auto Recon Bash Scriptā31Dec 31, 2024Updated last year
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.ā38Aug 21, 2019Updated 6 years ago
- Automate AV evasion by calling AMSIā88May 31, 2023Updated 2 years ago