0xdabbad00 / icebuddhaLinks
Generic binary file parser
☆59Updated 10 years ago
Alternatives and similar repositories for icebuddha
Users that are interested in icebuddha are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- You'll never take me alive.☆86Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago
- LibreSSL with a backdoor in RSA key generation☆17Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- ☆13Updated 7 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- ☆24Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 7 months ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- ☆17Updated 7 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- Statically linked Library detector☆70Updated 10 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- IRMA frontend☆25Updated 8 years ago
- Small and cheap standalone USB sanitizer☆43Updated 4 years ago
- Install script for grsecurity for Debian environments☆60Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago