mucomplex's repositories
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
how2exploit_binary
An in depth tutorial on how to do binary exploitation
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
linux-exploit-suggester
Linux privilege escalation auditing tool
windows-pentest
Windows Pentest Scripts
aquatone
A Tool for Domain Flyovers
Awesome-Fuzzing
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
Exploit-Challenges
A collection of vulnerable ARM binaries for practicing exploit development
exploit-CVE-2017-7494
SambaCry exploit and vulnerable container (CVE-2017-7494)
game-hacking
Tutorials, tools, and more as related to reverse engineering video games.
how2heap
A repository for learning various heap exploitation techniques.
Infosec_Reference
An Information Security Reference That Doesn't Suck
linux-exploitation-course
A Course on Intermediate Level Linux Exploitation
linux-kernel-exploits
linux-kernel-exploits Linux平台提权漏洞集合
MBE
Course materials for Modern Binary Exploitation by RPISEC
msdat
MSDAT: Microsoft SQL Database Attacking Tool
OSCP-2
Collection of things made during my OSCP journey
ROPgadget
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
tbhm
The Bug Hunters Methodology
The-Security-Handbook
A useful reference guide and a handbook of security basics for those starting out.
The_Holy_Book_of_X86
A complete guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....
WHP
Micro$oft Windows Hacking Pack
windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!