-
-
- Asturias
- https://blogs.tunelko.com
-
ImpersonateProcessUser Public
The ImpersonateProcess project is a Windows-based utility written in C that demonstrates known techniques for security context manipulation, specifically focusing on impersonating the user associat…
C UpdatedApr 5, 2024 -
CVE-2022-22954-PoC Public
VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.
-
-
Active-Directory-Exploitation-Cheat-Sheet-1 Public
Forked from S1ckB0y1337/Active-Directory-Exploitation-Cheat-SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
MIT License UpdatedJan 27, 2021 -
Active-Directory-Exploitation-Cheat-Sheet Public
Forked from Integration-IT/Active-Directory-Exploitation-Cheat-SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
PowerShell MIT License UpdatedJul 3, 2020 -
Pwdb-Public Public
Forked from ignis-sec/Pwdb-PublicA collection of all the data i could extract from 1 billion leaked credentials from internet.
MIT License UpdatedJul 1, 2020 -
openvpn-status Public
Forked from tonyseek/openvpn-statusParse OpenVPN status logs in Python
Python MIT License UpdatedAug 27, 2019 -
ATTACK-Tools Public
Forked from nshalabi/ATTACK-ToolsUtilities for MITRE™ ATT&CK
HTML UpdatedJun 16, 2019 -
-
-
-
botnets Public
Forked from maestron/botnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
C++ UpdatedSep 2, 2018 -
-
chromepass Public
Forked from hassaanaliw/chromepassGet all passwords stored by Chrome on WINDOWS.
Python MIT License UpdatedJun 21, 2017 -
DCS17CTF_S21Sec_task_and_writeups
-
mitigation-bounty Public
Forked from mxatone/mitigation-bountyLater
HTML MIT License UpdatedDec 19, 2016 -
mousejack_transmit Public
Forked from iamckn/mousejack_transmitWireless mouse/keyboard attack with replay/transmit poc
Python UpdatedJul 10, 2016 -
AlgorithmVisualizer Public
Forked from algorithm-visualizer/algorithm-visualizerAlgorithm Visualizer
JavaScript Other UpdatedJun 19, 2016 -
awesome-windows-exploitation Public
Forked from GuardianRG/awesome-windows-exploitationA curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
Artistic License 2.0 UpdatedMay 24, 2016 -
Pazuzu Public
Forked from BorjaMerino/PazuzuPazuzu: Reflective DLL to run binaries from memory
Python UpdatedApr 8, 2016 -
RSA-and-LLL-attacks Public
Forked from mimoo/RSA-and-LLL-attacksattacking RSA via lattice reductions (LLL)
-
-
MBE Public
Forked from RPISEC/MBECourse materials for Modern Binary Exploitation by RPISEC
C BSD 2-Clause "Simplified" License UpdatedApr 5, 2016 -
-
Internetwache-CTF-2016 Public
Forked from internetwache/Internetwache-CTF-2016The Internetwache CTF 2016 repository
Python Other UpdatedFeb 24, 2016 -
Hob0Rules Public
Forked from praetorian-inc/Hob0RulesPassword cracking rules for Hashcat based on statistics and industry patterns
UpdatedFeb 11, 2016 -
lobotomy Public
Forked from UsefulAnd/lobotomyAndroid Reverse Engineering Framework & Toolkit
Python GNU General Public License v2.0 UpdatedJan 31, 2016 -
Androl4b Public
Forked from sh4hin/Androl4bA Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis
UpdatedJan 27, 2016 -
imovil2014 Public
Forked from jentrialgo/imovil2014Repository for Hacker Master, an app developed for the course Informática Móvil of the EPI Gijón
Java Apache License 2.0 UpdatedJan 21, 2016 -
awesome-pentest Public
Forked from enaqx/awesome-pentestA collection of awesome penetration testing resources, tools and other shiny things