Count Dracul Yeamin the Scorpio's Projects
This Bufferflow Guide includes instructions and the scripts necessary for Buffer Overflow Exploitation. This guide is a supplement for TheCyberMentor's walkthrough. Please watch his walkthrough if you're confused. Feel free to implement Pull Requests or raise Issues.
Don't let buffer overflows overflow your mind
We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)
Ressources for bug bounty hunting
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
Bug Bounty Roadmaps
![logo](https://github.com/curated-intel/Ukraine-Cyber-Operations/blob/main/ci-logo.png) aini. Glory to Ukraine. ([Blog](https://www.curatedintel.org/2021/08/welcome.html) |ository to help organisations in Ukraine ps://gitional resources, chronologes](https://gisint-sources) sectioAC of
A list of interesting payloads, tips and tricks for bug bounty hunters.
Open source education content for the researcher community
Master programming by recreating your favorite technologies from scratch.
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
The BXAQ malware is used in China. They force tourists to install this app at the border. The malware downloads a tourist’s text messages, calendar entries, and phone logs, as well as scans the device for over 70,000 different files.
An open-source post-exploitation framework for students, researchers and developers.
Bypass Malware Sandbox Evasion Ram check
Powerful Token Logger script that can steal all types of Data and sends out via discord webhook. This includes Roblox, Steam, browser History, IP, location and much more!
Extract C2 Traffic
Automated rogue access point setup tool.
tries to display wikileaks cablegate cable messages as a graph
Automated Adversary Emulation Platform
Asterisk Call Flooder
C++ self-Injecting dropper based on various EDR evasion techniques.
I hacked my own webcam from a Kali Linux VM in my local network, using Ettercap to do the MiTM ARP poisoning attack, sniffing with Wireshark, and using metasploit
Cameradar hacks its way into RTSP videosurveillance cameras
Grab cam shots from target's phone front camera or PC webcam just sending a link.
Security analysis toolkit for proprietary car protocols
car hacking tools
carhacking tools
Towards the Prevention of Car Hacking: A Threat to Automation Industry