stuxnet999 / Forensics-WorkshopLinks
A set of 10 challenges for Forensics workshop, VIDYUT'19
☆14Updated 4 years ago
Alternatives and similar repositories for Forensics-Workshop
Users that are interested in Forensics-Workshop are comparing it to the libraries listed below
Sorting:
- ☆18Updated last year
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago
- buffer overflow examples☆22Updated 7 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆22Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- ☆26Updated 5 years ago
- ☆10Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆20Updated 5 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- yet another dirbuster☆19Updated 4 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- ☆33Updated 5 months ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 11 years ago
- eXtremely fast data eXtraction via blind SQL injection☆15Updated 12 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago