Rioru's starred repositories
afl-training
Exercises to learn how to fuzz with American Fuzzy Lop
Blacklist3r
project-blacklist3r
Edu-Mail-Generator
Generate Free Edu Mail(s) within minutes
DefaultCreds-cheat-sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
bytecode-viewer
A Java 8+ Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More)
SweetPotato
Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019
windows_kernel_address_leaks
Examples of leaking Kernel Mode information from User Mode on Windows
CVE-2020-0796
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
PowerShell-Suite
My musings with PowerShell
ghidra-data
Supporting Data Archives for Ghidra
ioctlfuzzer
Automatically exported from code.google.com/p/ioctlfuzzer
Screwed-Drivers
"Screwed Drivers" centralized information source for code references, links, etc.
Realtek-rtkio64-Windows-driver-privilege-escalation
A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.
HackSysExtremeVulnerableDriver
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Awesome-Advanced-Windows-Exploitation-References
List of Awesome Advanced Windows Exploitation References
rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.
jackson-rce-via-spel
An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions
WindowsExploitationResources
Resources for Windows exploit development