Pinned Repositories
0day
Collection of my 0 day that I found that I reported to MITRE for CVE.
432mystery
This is my solutions to the 432 mystery [ http://rjzdqt4z3z3xo73h.onion ]. This is a secret webpage that is hidden in the deepweb and only accessable at the union network and by itś ipv6 address.
asm
This is a collection of shellcodes modified or written by me.
cluster-manager
This project is intended to be a replacement for pacemaker and various other fail-over cluster solutions that manages a DRBD filesystem.
code-mode-flow
Streams youtube to all chromecast connected devices in the network
Exploits
Exploits developed by Mikael Kall
HackingAllTheThings
My documentation and tools for learn ethical hacking.
massrecon
This reconissance tool is specific written for OSCP engagements.
vuln
Project to practice the basic at exploit bufferoverflow bugs.
vulnhub
Dockerized web applications that has any known vurnerability and examples on how to exploit them.
mikaelkall's Repositories
mikaelkall/HackingAllTheThings
My documentation and tools for learn ethical hacking.
mikaelkall/OSCP-cheat-sheet
Offensive Security Certified Professional ( Preparation documentation )
mikaelkall/massrecon
This reconissance tool is specific written for OSCP engagements.
mikaelkall/Exploits
Exploits developed by Mikael Kall
mikaelkall/vuln
Project to practice the basic at exploit bufferoverflow bugs.
mikaelkall/vulnhub
Dockerized web applications that has any known vurnerability and examples on how to exploit them.
mikaelkall/0day
Collection of my 0 day that I found that I reported to MITRE for CVE.
mikaelkall/asm
This is a collection of shellcodes modified or written by me.
mikaelkall/code-mode-flow
Streams youtube to all chromecast connected devices in the network
mikaelkall/ctf
Writeup and solutions on CTF I have solved.
mikaelkall/Hack-Tools
The all-in-one Red Team extension for Web Pentester 🛠
mikaelkall/penetrator
Script that makes wpa2 wifi cracking very simple.
mikaelkall/pokemon-bot
A pokemon go bot that will catch them all
mikaelkall/reconnaissance
Reconnaissance tools
mikaelkall/write-ups-2016
Wiki-like CTF write-ups repository, maintained by the community. 2016
mikaelkall/cheatsheet-kubernetes-A4
:book: Kubernetes CheatSheets In A4
mikaelkall/docker
Repository with my docker containers
mikaelkall/gocdrce_helper
Not intended for the audience, this is just a helper script that is git cloned by exploit code in a gocd pipeline to setup a reverse_tcp connection.
mikaelkall/hipster
C application that will forward alerts to different systems.
mikaelkall/l33tbot
l33tbot source-code used ona IRC channel where I'm a regular user.
mikaelkall/mikaelkall
Profile README.md
mikaelkall/mikaelkall.github.io
GitHub pages
mikaelkall/nighter.se
Private homepage that uses nodejs express and runs under docker or a unikernel.
mikaelkall/NighterSSH
Simple SSH client written in .NET built on Granados SSH library.
mikaelkall/OSWE
OSWE Preparation
mikaelkall/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
mikaelkall/SolaceSystems.Solclient
Unofficial NuGet package of Solclient to communicate with a solace appliance.
mikaelkall/vagrant-b0f
Ubuntu 32bit vagrant image. Built for boot an image to practice simple b0f exploitation.
mikaelkall/windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
mikaelkall/YubiKey-Guide
Guide to using YubiKey for GPG and SSH