☆34Sep 30, 2019Updated 6 years ago
Alternatives and similar repositories for r2lrn
Users that are interested in r2lrn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- Codecave miner☆14Dec 21, 2022Updated 3 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Simple and small library that allows disassembly of raw bytes for multiple architectures☆30May 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 4 months ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- ROM built with CMake☆11Jan 24, 2023Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- Hypervisor from scratch in linux☆13May 8, 2022Updated 3 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- whois.cynthia.re V2☆13May 23, 2021Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- A Linux Kernel module keylogger, so that we can log all the keystrokes no matter who is the user! 🧐☆12May 22, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated 2 weeks ago
- A frozen version of angr for the SAILR paper☆16Sep 4, 2024Updated last year
- Version 2 of the MINA Instruction Set Architecture.☆10Jan 31, 2024Updated 2 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Some tools☆10Dec 5, 2017Updated 8 years ago
- Clean mvvm architecture WhatsApp clone, buit with Flutter☆14Nov 2, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Small ROM that runs some tests to determine if cache is being emulated correctly☆12Feb 24, 2022Updated 4 years ago
- A GDB stub implimentation for n64 that allows debugging in cen64☆12Aug 22, 2020Updated 5 years ago
- A tool for extracting, modifying, and crafting ASDM binary packages (CVE-2022-20829)☆13Aug 15, 2022Updated 3 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Build runner for deploying application to AWS EC2 and on-premise instances using AWS CodeDeploy☆11Feb 8, 2024Updated 2 years ago
- Native Windows implementations of common Unix utilities☆14Feb 16, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A library of tools I assembled from various sources in preparation for the REDEYE hack night ctf☆49Aug 11, 2025Updated 7 months ago
- ☆10Dec 29, 2022Updated 3 years ago
- Dataset and tool to analyse and compare java bytecode decompilers http://arxiv.org/pdf/1908.06895☆21Jun 3, 2020Updated 5 years ago
- Introductory challenges for Ghidra Golf☆14Feb 13, 2023Updated 3 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago