stevenswafford / everything-security
security related events, tools, tutorials, cheatsheets, and more.
☆11Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for everything-security
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Check for .net padding oracle patch☆19Updated 6 years ago
- Scripts for OSCE☆18Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Vagrant files to bootstrap VM for CTFs☆10Updated 8 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- ☆20Updated 5 years ago
- ☆24Updated 6 months ago
- ☆15Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- Pentest utils☆14Updated 8 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- miscellaneous stuff☆21Updated 9 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- only for 31337☆21Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- Group Policy Hijacking☆31Updated 6 years ago
- ☆36Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago