There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Buffer-Overflow-Exploit-Development-Practice
Good For OSCP TrainingAnsible-Hidden-Service-Deployment
Configures a regular ubuntu server to run as a tor hidden server running apache utilising ansibleAdvanced-Windows-Exploit-Development-Practice
ASLR Evasion, Egghunters, SEH Overwritespentestscripts
pentestscriptsBinary-Exploitation
Basic Binary Exploitation / Buffer OverflowsARP-Sniffer-Spoofer
ARP Exploitation in PythonCCTV-Remote-Code-Execution-Metasploit-Module
CCTV Remote Code Execution Metasploit Modulenetworkforensics
Deep Learning for Network Forensicsoscprep
OSCP Prephandybashscripts
Miscellaneous Bash ScriptsNagios-XI-5.2.7-Metasploit-Module
Nagios XI 5.2.7 Metasploit Modulepythonbashvbox
Deployment of Virtual Machines in Virtualbox using Shell scripts called via Python to VBOXmanageScyther-Cryptography-Analysis
Scyther Cryptography AnalysisRSA
RSALacrosse
LacrosseWinamp-5.12-Playlist-UNC-Path-Computer-Name-Overflow-Remote-Code-Execution-Exploit
In python not perl :PData-Dump-Credentials-Age-Analysis
Data BreachAge Analysis By Comparing Against HaveIBeenPwned APILove Open Source and this site? Check out how you can help us