☆47Mar 28, 2017Updated 8 years ago
Alternatives and similar repositories for security
Users that are interested in security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated 3 weeks ago
- ☆139May 17, 2017Updated 8 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- ☆13Mar 7, 2025Updated last year
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- SAP Message Server research presented at OPCDE 2019☆35Aug 18, 2020Updated 5 years ago
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 5 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Enumeration Guide☆45Dec 30, 2019Updated 6 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20May 15, 2025Updated 10 months ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated this week
- Notes of my OSCP study plan☆466Jun 29, 2022Updated 3 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆37Mar 10, 2023Updated 3 years ago
- Collection of things made during my OSCP journey☆954Feb 24, 2022Updated 4 years ago
- driver manual mapper☆12Feb 22, 2020Updated 6 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- These are my favorite places for learning various topics.☆34Jun 7, 2018Updated 7 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Automatically generating WADL in Spring MVC REST application☆28Jul 7, 2022Updated 3 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- My linux config files☆10Mar 14, 2026Updated last week
- Query accurate gas prices on every blockchain network ⛽️☆13Jun 16, 2023Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- Source from https://twitter.com/pwnallthethings. Compiled in VS 2013☆18Jan 30, 2018Updated 8 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- AntSword Generate Shell Plugin☆12Jun 26, 2022Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- An archive of everything related to OSCP☆626Sep 14, 2020Updated 5 years ago
- Docker image with ps4-exploit-host application☆10Mar 11, 2024Updated 2 years ago