All Projects → 0xdea → raptor_infiltrate20

0xdea / raptor_infiltrate20

Licence: MIT license
#INFILTRATE20 raptor's party pack

Programming Languages

c
50402 projects - #5 most used programming language
shell
77523 projects

Projects that are alternatives of or similar to raptor infiltrate20

raptor infiltrate19
#INFILTRATE19 raptor's party pack
Stars: ✭ 27 (+12.5%)
Mutual labels:  slides, exploits, solaris, buffer-overflow
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+2458.33%)
Mutual labels:  exploits, vulnerability
Vfeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+3341.67%)
Mutual labels:  exploits, vulnerability
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+43445.83%)
Mutual labels:  exploits, vulnerability
Api
Vulners Python API wrapper
Stars: ✭ 313 (+1204.17%)
Mutual labels:  exploits, vulnerability
SAP vulnerabilities
DoS PoC's for SAP products
Stars: ✭ 47 (+95.83%)
Mutual labels:  vulnerability, buffer-overflow
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+200%)
Mutual labels:  exploits, vulnerability
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (+375%)
Mutual labels:  exploits, vulnerability
Avpwn
List of real-world threats against endpoint protection software
Stars: ✭ 179 (+645.83%)
Mutual labels:  exploits, vulnerability
Exploit Framework
🔥 An Exploit framework for Web Vulnerabilities written in Python
Stars: ✭ 144 (+500%)
Mutual labels:  exploits, vulnerability
exploits
Some of my public exploits
Stars: ✭ 50 (+108.33%)
Mutual labels:  exploits, vulnerability
CVE-2019-8449
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Stars: ✭ 66 (+175%)
Mutual labels:  exploits, vulnerability
uac
UAC is a Live Response collection script for Incident Response that makes use of native binaries and tools to automate the collection of AIX, Android, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris systems artifacts.
Stars: ✭ 260 (+983.33%)
Mutual labels:  solaris
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (+408.33%)
Mutual labels:  exploits
meetup-slides
Speaker slides from monthly meetups and conference
Stars: ✭ 18 (-25%)
Mutual labels:  slides
courses
课件:数字图像处理,计算机视觉,人工智能导论,机器学习,深度学习
Stars: ✭ 58 (+141.67%)
Mutual labels:  slides
xaringan slides
📺 Links to HTML5 presentations made using the R package {xaringan}.
Stars: ✭ 20 (-16.67%)
Mutual labels:  slides
takahashi.js
Make Takahashi-style slide easily!
Stars: ✭ 30 (+25%)
Mutual labels:  slides
autoindex
PHP - Automatically add an "index.php" in all directories recursively
Stars: ✭ 25 (+4.17%)
Mutual labels:  vulnerability
massh-enum
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
Stars: ✭ 136 (+466.67%)
Mutual labels:  vulnerability

raptor_infiltrate20

"Bugs are by far the largest and most successful class of entity."

-- Encyclopedia of Animal Life

This repository contains all materials related to my talk "The INFILTRATE effect: 6 bugs in 6 months" presented at #INFILTRATE20 on January 26, 2021.

Related links:
https://vimeo.com/474793702 (video)

advisories

exploits

slides

  • 6bugs.pdf. Slide deck presented at #INFILTRATE20 (PDF version).
  • 6bugs.pptx. Slide deck presented at #INFILTRATE20 (PowerPoint version).
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].