zom3y3 / slidesLinks
slides
☆9Updated 3 years ago
Alternatives and similar repositories for slides
Users that are interested in slides are comparing it to the libraries listed below
Sorting:
- Syclover PPT☆30Updated 8 years ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Updated 5 years ago
- ☆35Updated 5 years ago
- ☆17Updated 8 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Updated 6 years ago
- ☆18Updated 7 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Updated 6 years ago
- 0CTF 2015 Final web problem☆16Updated 10 years ago
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API☆19Updated 7 years ago
- ☆20Updated 3 years ago
- Treck Network Stack Discovery Tool by JSOF☆33Updated 5 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- source code of XCTF 2019 Final web task "tfboys"☆29Updated 2 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆14Updated 2 years ago
- CVE-2017-13089☆55Updated 7 years ago
- 010 Editor template for ACE archive format & CVE-2018-2025[0-3]☆25Updated 6 years ago
- Collection of CTF challenges I made☆18Updated 7 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- Collection of AI and Security Papers☆27Updated 5 years ago
- ☆32Updated 5 years ago
- CTF stuff☆40Updated 2 years ago
- A simple script for quickly mining sensitive information in binary files.☆29Updated 4 years ago
- 获取系统KB补丁对于的MS号☆24Updated 5 years ago
- ☆16Updated 7 years ago
- Knowledge Base 慢雾安全团队知识库☆29Updated 5 years ago
- 做过的实验,踩过的坑☆40Updated 7 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆55Updated 3 years ago
- ☆24Updated 5 years ago
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Updated 5 years ago
- ☆8Updated 5 years ago