Alvaro's repositories
reversing-list
Reversing list
exploiting
Exploiting challenges in Linux and Windows
hash-collision-attack
A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functions have infinite input length and a predefined output length, there is inevitably going to be the possibility of two different inputs that produce the same output hash. If two separate inputs produce the same hash output, it is called a collision. This collision can then be exploited by any application that compares two hashes together – such as password hashes, file integrity checks, etc.
Scripting-with-IDAPython
Solutions of Ricardo Narvaja IDA reversing course
sniff-gathe
Script (shell script) para automatizar escaneo de una red interna y ataque Man in the Middle
linuxprotect
Monitoring and defending Linux servers
file-descriptor-stdin-attack
In Unix and related computer operating systems, a file descriptor (FD, less frequently fildes) is an abstract indicator (handle) used to access a file or other input/output resource, such as a pipe or network socket. File descriptors form part of the POSIX application programming interface. A file descriptor is a non-negative integer, generally represented in the C programming language as the type int (negative values being reserved to indicate "no value" or an error condition). Each Unix process (except perhaps a daemon) should expect to have three standard POSIX file descriptors, corresponding to the three standard streams.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
fwhibbit.github.io
Webpage for ehical hacking group named fwhibbit.
liveoverflow_youtube
Material for the YouTube series
NVMS1000-Exploit
NVMS 1000 - Directory Traversal Attack Exploit for CVE-2019-20085
radare2-r2pipe
Access radare2 via pipe from any programming language!
write-ups-2013
Wiki-like CTF write-ups repository, maintained by the community. 2013
xira
xira is xss vulnerability scanner. It simply collects all input fields form website. And test each of them with some cool payloads. Thus, if we get any vulnerable input field then it got printed on terminal/console with successful payloads.
XSStrike
Most advanced XSS scanner.