Pinned Repositories
BinaryExploitation
Code samples and notes to aid in the learning of binary reverse engineering and exploitation.
cprintf
All the funtionality of printf but with colors and markings.
JJRC-H43WH-Controller
Reverse engineering of a JJRC H43WH quadcopter network protocols to build a better control system.
NerdNight
Examples written in C for NerdNight
Student-Data
Student database parsing in java
Subnet-Calc
Network calculator based on CIDR notation.
TCPScanner
Simple and and quickly written TCP port scanner
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
UnmanagedPowerShell
Executes PowerShell from an unmanaged process
XorCipher
A 256 bit block cipher using XOR magic.
turtles4all's Repositories
turtles4all/JJRC-H43WH-Controller
Reverse engineering of a JJRC H43WH quadcopter network protocols to build a better control system.
turtles4all/BinaryExploitation
Code samples and notes to aid in the learning of binary reverse engineering and exploitation.
turtles4all/NerdNight
Examples written in C for NerdNight
turtles4all/Subnet-Calc
Network calculator based on CIDR notation.
turtles4all/TCPScanner
Simple and and quickly written TCP port scanner
turtles4all/unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
turtles4all/cprintf
All the funtionality of printf but with colors and markings.
turtles4all/Student-Data
Student database parsing in java
turtles4all/XorCipher
A 256 bit block cipher using XOR magic.
turtles4all/awesome-ctf
A curated list of CTF frameworks, libraries, resources and softwares
turtles4all/bropy
Basic Anomaly IDS capabilities with Python and Bro
turtles4all/C-Examples
C program examples.
turtles4all/CTF-writeups-public
Writeups for infosec Capture the Flag events
turtles4all/CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
turtles4all/DaemonTemplate
Daemon in C
turtles4all/Effective-Python-Penetration-Testing
Effective Python Penetration Testing by Packt Publishing
turtles4all/GitTools
A repository with 3 tools for pwn'ing websites with .git repositories available
turtles4all/google_socks
A proof of concept demonstrating the use of Google Drive for command and control.
turtles4all/krackattacks-test-ap-ft
turtles4all/Mirai-Source-Code
Leaked Mirai Source Code for Research/IoC Development Purposes
turtles4all/poisontap
Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons cookies using Raspberry Pi Zero & Node.js.
turtles4all/Python-Reverse-Shell
Learning Python by coding a shell from scratch.
turtles4all/PythonGui
A GUI template for python *learning tkinter
turtles4all/Red-DiscordBot
A multifunction Discord bot
turtles4all/Scantime
/dev/tcp scanner
turtles4all/scripts
TurtlePower
turtles4all/ShadowForce
Brute force shadow sha512 passwords.
turtles4all/ShittyRat
turtles4all/social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
turtles4all/wetty
Terminal in browser over http/https. (Ajaxterm/Anyterm alternative, but much better)