Stash for Binary Exploitation and Reverse Engineering Resources
☆105Sep 22, 2020Updated 5 years ago
Alternatives and similar repositories for Scuffed_Low_Level_Stash
Users that are interested in Scuffed_Low_Level_Stash are comparing it to the libraries listed below
Sorting:
- Taking another crack at OS dev...☆11Jun 12, 2022Updated 3 years ago
- ☆21Jan 11, 2022Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- This is a MD5 password/passphrase brute force tool☆10Mar 13, 2021Updated 4 years ago
- Detects and extracts images from Goerli Testnet blockchain☆24Nov 25, 2021Updated 4 years ago
- ☆14Feb 12, 2026Updated 3 weeks ago
- ☆15Aug 17, 2023Updated 2 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Short Python script that attempts to neuter USB Rubber Duckies.☆13Jun 25, 2019Updated 6 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Source for BuckeyeCTF 2022 challenges☆28Nov 7, 2022Updated 3 years ago
- CTF WriteUps by team TWC☆16Jun 3, 2025Updated 9 months ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- ☆23Jul 3, 2020Updated 5 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- JavaScript for Automation (JXA) version of Patrick Wardle's tool that searches applications for dylib hijacking opportunities☆22Aug 6, 2019Updated 6 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated 2 weeks ago
- ☆2,925Feb 8, 2026Updated 3 weeks ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- ☆48May 12, 2021Updated 4 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Directory Fuzzer for Pentesting and Host Recon☆29Nov 10, 2018Updated 7 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- Use GZip to compress your .NET assemblies for loading with AssemblyResolve.☆20Apr 11, 2014Updated 11 years ago
- Pokemon Scarlet&Violet randomizer☆13Jul 19, 2023Updated 2 years ago
- A standalone WMI protocol for CrackMapExec☆51Feb 3, 2020Updated 6 years ago