☆76Mar 24, 2021Updated 4 years ago
Alternatives and similar repositories for Buffer-Overflows
Users that are interested in Buffer-Overflows are comparing it to the libraries listed below
Sorting:
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Jul 15, 2021Updated 4 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- OSCP Buffer Overflow cheat sheet☆180Aug 13, 2020Updated 5 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- Modified template for the OSCP Exam and Labs. Used during my passing attempt☆959Jun 3, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆1,156Apr 21, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- ☆11May 13, 2024Updated last year
- Reverse shell generator☆23Oct 3, 2019Updated 6 years ago
- Study Guide for the LFCS exam☆13Jul 4, 2018Updated 7 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Pakistan Cyber Security Challenge - 2023 CTF☆15Aug 14, 2025Updated 6 months ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- OSCP Buffer Overflow in 30 minutes☆37Jun 12, 2019Updated 6 years ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Jan 21, 2020Updated 6 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- ☆168Oct 21, 2023Updated 2 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆59Nov 22, 2019Updated 6 years ago
- ☆38Nov 20, 2025Updated 3 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 10 months ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- Don't let buffer overflows overflow your mind☆450Jun 3, 2020Updated 5 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- ☆16Dec 2, 2019Updated 6 years ago
- ☆1,394Apr 25, 2021Updated 4 years ago
- Commands, snippets, exploits, tools, lists, collections and techniques I used on my journey to becoming an OSCP.☆306Mar 10, 2021Updated 4 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆15Sep 8, 2020Updated 5 years ago