Defender0x58's Stars
matthieu-hackwitharts/Win32_Offensive_Cheatsheet
Win32 and Kernel abusing techniques for pentesters
dod-cyber-crime-center/DC3-MWCP
DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, filenames, and mutex names.
kevoreilly/CAPEv2
Malware Configuration And Payload Extraction
esThreatIntelligence/RussianPanda_tools
bailey-f/malware-dev
general notes and journey of learning malware development
safesploit/PythonRAT
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
x4nth055/ethical-hacking-tools-python
Python programs & tools built in the Ethical Hacking with Python EBook
cr-0w/maldev
⚠️ malware development
lkmidas/Short-CTF-Writeups
Short writeups/solvers for interesting CTF challenges.
0xbharath/art-of-packet-crafting-with-scapy
A workshop on Packet Crafting using Scapy.
keithjjones/CSC842
Links for CSC842 Projects at dsu.edu
orangice/Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
jstrosch/learning-reverse-engineering
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
InverseIntegral/ctf_writeups
invictus1306/Workshop-BSidesMunich2018
ARM shellcode and exploit development - BSidesMunich 2018
mogwailabs/canape-workshop2018
Material from our CANAPE workshop
emilyanncr/Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
DiabloHorn/rdps2rdp
Decrypt MITM SSL RDP and save to pcap
opensourcesec/Forager
Multithreaded threat Intelligence gathering built with Python3