Solutions for Exploit-Exercises Protostar
☆75Dec 11, 2014Updated 11 years ago
Alternatives and similar repositories for Exploit-Exercises-Protostar
Users that are interested in Exploit-Exercises-Protostar are comparing it to the libraries listed below
Sorting:
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/protostar-solutions☆13Mar 26, 2015Updated 10 years ago
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- ☆13Oct 12, 2019Updated 6 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Reverse-engineer a Dockerfile from a Docker image.☆15Nov 7, 2023Updated 2 years ago
- KIISC Digital Forensics Challenge 2021 - DogeCoin's WriteUp☆17Dec 1, 2022Updated 3 years ago
- 看雪 LLVM与代码混淆技术 笔记☆23Aug 31, 2023Updated 2 years ago
- 统计路由器CVE,便于漏洞挖掘☆74Feb 27, 2024Updated 2 years ago
- 鉴势-工控系统信息安全及态势感知系统☆18Jan 6, 2019Updated 7 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- alibabacloud-cdn-tool-toa☆26Oct 17, 2024Updated last year
- ☆28Oct 4, 2021Updated 4 years ago
- Rust语言安全相关分析☆23Jan 20, 2022Updated 4 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- ☆30Dec 4, 2018Updated 7 years ago
- Penetration testing with shellcode codes☆28Jan 25, 2018Updated 8 years ago
- ☆26Jun 3, 2016Updated 9 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71May 27, 2021Updated 4 years ago
- A console debugger using DbgX and Terminal.Gui☆30Oct 12, 2022Updated 3 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Oct 24, 2022Updated 3 years ago
- PoC || GTFO Issues☆70Feb 12, 2020Updated 6 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆36Nov 26, 2025Updated 3 months ago
- 探究底层机制:二进制安全☆35Sep 1, 2023Updated 2 years ago
- ☆32Nov 6, 2019Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆1,853Oct 23, 2024Updated last year
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago