Pinned Repositories
0wned
Code execution via Python package installation.
AD-Attack-Defense
Active Directory Security For Red & Blue Team
advisories
AndroidInterview-Q-A
The top Internet companies android interview questions and answers
API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
awesome-appsec
A curated list of resources for learning about application security
Bella
A pure python, post-exploitation, data mining tool and remote administration tool for macOS.
Docker-Secure-Deployment-Guidelines
Deployment checklist for securely deploying Docker
MobileApp-Pentest-Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
public-pentesting-reports
Curated list of public penetration testing reports released by several consulting firms
0x13337's Repositories
0x13337/Corelan-Exploit-tutorial-part-1-Stack-Based-Overflows
All exploits used in Corelans tutorial part 1 have been ported to Ruby & have been verified do give up a shell.
0x13337/CSPTools
Content Security Policy Creation tools
0x13337/g4h-webinar
Garage4Hackers Browser Crash Analysis Webinar
0x13337/GWT-Penetration-Testing-Toolset
A set of tools made to assist in penetration testing GWT applications. Additional details about these tools can be found on my OWASP Appsec DC slides available here: http://www.owasp.org/images/7/77/Attacking_Google_Web_Toolkit.ppt
0x13337/hexcalc
0x13337/Leaked_Malware_SourceCode
Collections of Malware source code
0x13337/Linux_Exploit_Suggester
Linux Exploit Suggester; based on operating system release number
0x13337/PIC_Bindshell
Position Independent Windows Shellcode Written in C
0x13337/pivoter
Pivoter is a proxy tool for pentesters to have easier lateral movement.
0x13337/PoCForCVE-2015-1528
I'll submit the poc after blackhat
0x13337/PowerShellArsenal
A PowerShell Module Dedicated to Reverse Engineering
0x13337/pydbg
A pure-python win32 debugger interface.
0x13337/sandy
Static and Dynamic exploit analysis framework.
0x13337/unicode-security-guide
Unicode Security Guide
0x13337/Unix-Privilege-Escalation-Exploits-Pack
Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.
0x13337/windows-privesc-check
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
0x13337/WMI_Backdoor
A PoC WMI backdoor presented at Black Hat 2015
0x13337/XSS-Callback
A lightweight HTTP Server that exploits XSS victim's session automatically