Stars
HTB - Iterative virus writeup
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices
Some setup scripts for security research tools.
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
Материалы для прочтения и изучения темы Reverse Engineering
5
Updated Feb 8, 2021