Highlights
- Pro
Stars
UNIX-like reverse engineering framework and command-line toolset
A repository for learning various heap exploitation techniques.
A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Course materials for Modern Binary Exploitation by RPISEC
A low-power E-Paper weather display powered by an ESP32 microcontroller. Utilizes the OpenWeatherMap API.
A tool to dump the login password from the current linux user
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Connect like there is no firewall. Securely.
Wiki-like CTF write-ups repository, maintained by the community. 2016
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Demos of various injection techniques found in malware
This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.
Some pwn challenges selected for training and education.
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
The source code of the Zeus Evolution botnet that used TOR.