Pinned Repositories
ariadna
Fuzzer simple para encontrar vulnerabilidades sql y xss
artemisa
Escaner de red y enumeracion de puertos
eris
SQLi Login Authentication Bypass
exploiting
Exploiting challenges in Linux and Windows
file-descriptor-stdin-attack
In Unix and related computer operating systems, a file descriptor (FD, less frequently fildes) is an abstract indicator (handle) used to access a file or other input/output resource, such as a pipe or network socket. File descriptors form part of the POSIX application programming interface. A file descriptor is a non-negative integer, generally represented in the C programming language as the type int (negative values being reserved to indicate "no value" or an error condition). Each Unix process (except perhaps a daemon) should expect to have three standard POSIX file descriptors, corresponding to the three standard streams.
hash-collision-attack
A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functions have infinite input length and a predefined output length, there is inevitably going to be the possibility of two different inputs that produce the same output hash. If two separate inputs produce the same hash output, it is called a collision. This collision can then be exploited by any application that compares two hashes together – such as password hashes, file integrity checks, etc.
linuxprotect
Monitoring and defending Linux servers
reversing-list
Reversing list
Scripting-with-IDAPython
Solutions of Ricardo Narvaja IDA reversing course
sniff-gathe
Script (shell script) para automatizar escaneo de una red interna y ataque Man in the Middle
naivenom's Repositories
naivenom/reversing-list
Reversing list
naivenom/exploiting
Exploiting challenges in Linux and Windows
naivenom/hash-collision-attack
A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functions have infinite input length and a predefined output length, there is inevitably going to be the possibility of two different inputs that produce the same output hash. If two separate inputs produce the same hash output, it is called a collision. This collision can then be exploited by any application that compares two hashes together – such as password hashes, file integrity checks, etc.
naivenom/Scripting-with-IDAPython
Solutions of Ricardo Narvaja IDA reversing course
naivenom/sniff-gathe
Script (shell script) para automatizar escaneo de una red interna y ataque Man in the Middle
naivenom/eris
SQLi Login Authentication Bypass
naivenom/linuxprotect
Monitoring and defending Linux servers
naivenom/ariadna
Fuzzer simple para encontrar vulnerabilidades sql y xss
naivenom/artemisa
Escaner de red y enumeracion de puertos
naivenom/file-descriptor-stdin-attack
In Unix and related computer operating systems, a file descriptor (FD, less frequently fildes) is an abstract indicator (handle) used to access a file or other input/output resource, such as a pipe or network socket. File descriptors form part of the POSIX application programming interface. A file descriptor is a non-negative integer, generally represented in the C programming language as the type int (negative values being reserved to indicate "no value" or an error condition). Each Unix process (except perhaps a daemon) should expect to have three standard POSIX file descriptors, corresponding to the three standard streams.
naivenom/insane
Insanity notes from CTF Challenges
naivenom/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
naivenom/fwhibbit.github.io
Webpage for ehical hacking group named fwhibbit.
naivenom/hera
Command Line Red Team purpose
naivenom/liveoverflow_youtube
Material for the YouTube series
naivenom/nemesis
Fuzzer de ficheros y directorios en aplicacion web
naivenom/NVMS1000-Exploit
NVMS 1000 - Directory Traversal Attack Exploit for CVE-2019-20085
naivenom/radare2-r2pipe
Access radare2 via pipe from any programming language!
naivenom/selene
Recolección de información mediante protocolos y servicios
naivenom/write-ups-2013
Wiki-like CTF write-ups repository, maintained by the community. 2013
naivenom/xira
xira is xss vulnerability scanner. It simply collects all input fields form website. And test each of them with some cool payloads. Thus, if we get any vulnerable input field then it got printed on terminal/console with successful payloads.
naivenom/XSStrike
Most advanced XSS scanner.