Stars
proxychains ng (new generation) - a preloader which hooks calls to sockets in dynamically linked programs and redirects it through one or more socks/http proxies. continuation of the unmaintained p…
windows-kernel-exploits Windows平台提权漏洞集合
A repository for learning various heap exploitation techniques.
proxychains - a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: "user/pass" fo…
Course materials for Modern Binary Exploitation by RPISEC
A tool to dump the login password from the current linux user
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Web application security scanner created by lcamtuf for google - Unofficial Mirror
Enumerate and test Logitech wireless input devices for vulnerabilities with a nRF52840 radio dongle.
An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM
Dump various types of Windows credentials without injecting in any process.
Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.
Exercises for learning Reverse Engineering and Exploitation.
Hijack Putty sessions in order to sniff conversation and inject Linux commands.
Database of private SSL/SSH keys for embedded devices
builds database/visualizations of LAN structure from passively sifted information
Pivoter is a proxy tool for pentesters to have easier lateral movement.
Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.