stuxnet999 / Forensics-WorkshopLinks
A set of 10 challenges for Forensics workshop, VIDYUT'19
☆14Updated 4 years ago
Alternatives and similar repositories for Forensics-Workshop
Users that are interested in Forensics-Workshop are comparing it to the libraries listed below
Sorting:
- buffer overflow examples☆22Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Digital Forensics and Incident Response (DFIR) Workshop☆10Updated 7 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Python tool for Dorking☆11Updated 2 years ago
- Penetration testing course by Z0F.☆53Updated 3 years ago
- ☆12Updated 4 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆20Updated 5 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Updated 7 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- ☆18Updated last year
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- ☆15Updated 3 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆13Updated 3 years ago