MaskedFox's repositories
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Awesome-Vulnerability-Research
🦄 A curated list of the awesome resources about the Vulnerability Research
awesome-windows-exploitation
A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
awesome_cisco_exploitation
A curated list of awesome Cisco exploitation resources
Billy-Ellis.github.io
Website & Cydia repo
binaryninja-bookmarks
Plugin for BinaryNinja that provides bookmarking functionality
c-programming-a-modern-approach
Solutions to exercises and projects in the textbook C Programming: A Modern Approach, 2nd Edition.
Exploit-Challenges
A collection of vulnerable ARM binaries for practicing exploit development
exploit-database-bin-sploits
Exploit Database binary exploits located in the /sploits directory
Free-Security-eBooks
Free Security and Hacking eBooks
InsecureProgramming-1
Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
Kernel-Exploits
A curated list of Linux Exploitation resources,
libfuzzer-workshop
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
meterssh
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.
Powerful-Plugins
Powerful plugins and add-ons for hackers
Quickdraw-Snort
Digital Bond's IDS/IPS rules for ICS and ICS protocols.
reading-material
:books: Stuff to read up
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
unix-privesc-check
Automatically exported from code.google.com/p/unix-privesc-check