Telco training
☆26Oct 17, 2018Updated 7 years ago
Alternatives and similar repositories for hacklu2018
Users that are interested in hacklu2018 are comparing it to the libraries listed below
Sorting:
- ☆13Aug 28, 2018Updated 7 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- ☆21Dec 24, 2018Updated 7 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- ☆18Aug 4, 2020Updated 5 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- Make ARM Shellcode Great Again☆62Apr 8, 2021Updated 4 years ago
- Coronavirus disease 2019(COVID-19) statistical data from the Chinese medical community(dxy.cn) to json format☆21Jun 14, 2020Updated 5 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆63Feb 26, 2019Updated 7 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Feb 18, 2017Updated 9 years ago
- VM setup for Malware RE labs☆28Apr 26, 2019Updated 6 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆63Oct 19, 2017Updated 8 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- Slides, papers, etc☆33Mar 26, 2024Updated last year
- gpocheck☆30Aug 11, 2024Updated last year
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- Launch your SOC as fast as a rocket with only one command☆12Feb 17, 2025Updated last year
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago