AmitMT / daily-morning-attackLinks
☆11Updated 2 years ago
Alternatives and similar repositories for daily-morning-attack
Users that are interested in daily-morning-attack are comparing it to the libraries listed below
Sorting:
- Tami 4 Edge / Edge+ API In Python☆32Updated last year
- Assembler in C for a project in university☆8Updated last year
- Activate Windows & Office 🔑☆12Updated last year
- lowlevel cyber course - riscv & i8086 competition☆11Updated 6 years ago
- ☆12Updated last year
- A Python library to debug binary executables, your own way.☆236Updated this week
- Pinchasi Operating system - 32 bit☆9Updated 3 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 2 weeks ago
- Right click -> "Open with IDA"☆26Updated last year
- Write dynamic binary analysis tools in Python☆118Updated last month
- 🚩 framework for kernel memory exploitation (WIP)☆15Updated 4 months ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated 2 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Updated 4 years ago
- ☆18Updated 5 months ago
- Easily debug processes running in docker containers☆22Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆118Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆44Updated last year
- A Pythonic Ghidra standard library☆172Updated 2 months ago
- A/D CTF services developed for ECSC 2022☆12Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆59Updated last month
- An ELF parser written fully in NASM.☆9Updated last month
- 🐍 Solving CTF challenges using Z3 and Python☆61Updated 2 years ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆387Updated 5 months ago
- A virtualization-based endpoint security solution for Windows☆86Updated 4 years ago
- My notes on pwn☆287Updated 3 months ago
- Symbol Recovery Tool for Nuitka Binaries☆59Updated 6 months ago
- cr3 CTF 2024☆15Updated last year
- An intuitive query API for IDA Pro☆157Updated 3 months ago
- A research paper about the internals of memory management and heap exploitation☆25Updated 2 years ago
- Security Research☆39Updated 2 years ago