#INFILTRATE20 raptor's party pack.
☆30Nov 10, 2025Updated 5 months ago
Alternatives and similar repositories for raptor_infiltrate20
Users that are interested in raptor_infiltrate20 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 5 months ago
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆20Nov 10, 2025Updated 5 months ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆32Nov 10, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆294Jan 31, 2026Updated 2 months ago
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- ☆22Jan 15, 2025Updated last year
- Minimalistic cross-platform mouse jiggler written in Rust.☆24Apr 11, 2026Updated last week
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 5 years ago
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- ☆30Jul 18, 2025Updated 9 months ago
- ☆37Dec 27, 2021Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- HN Security's advisories.☆22Nov 7, 2025Updated 5 months ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 6 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- ☆13Jul 14, 2020Updated 5 years ago
- Some exploits I have written to showcase and to share☆53Mar 24, 2021Updated 5 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Nov 24, 2022Updated 3 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆61Apr 11, 2023Updated 3 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆77Sep 15, 2020Updated 5 years ago
- ☆64Mar 29, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated last month
- Port of Seatbelt in F#☆13Jul 12, 2020Updated 5 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- ☆57Apr 19, 2023Updated 3 years ago
- Reverse engineering basics in puzzle form☆183May 20, 2020Updated 5 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆422Mar 20, 2022Updated 4 years ago