stuxnet999 / Forensics-Workshop
A set of 10 challenges for Forensics workshop, VIDYUT'19
☆14Updated 4 years ago
Alternatives and similar repositories for Forensics-Workshop:
Users that are interested in Forensics-Workshop are comparing it to the libraries listed below
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- ☆18Updated last year
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- buffer overflow examples☆22Updated 7 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Journey to conquer the OSCP!☆13Updated 6 years ago
- Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Side Channel script☆25Updated 2 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 4 years ago
- ☆12Updated 4 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago