Slides and videos from my public speeches / conferences
☆84Mar 3, 2026Updated last month
Alternatives and similar repositories for related_work
Users that are interested in related_work are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A burp for intents wannabe☆81Jul 29, 2024Updated last year
- A list of bizarre crackmes☆146Mar 24, 2026Updated 3 weeks ago
- 🔓A Curated List Of Modern Android Exploitation Conference Talks.☆713Apr 4, 2026Updated last week
- Mobile Edge-Dynamic Unified Security Analysis☆2,218Updated this week
- An iOS app that lets you practice your Frida skills☆196Apr 20, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆54Oct 21, 2024Updated last year
- Trophy list of zero-day vulnerabilities that I discovered☆11May 6, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆41Mar 19, 2023Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆92Apr 14, 2024Updated 2 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆54Jun 2, 2025Updated 10 months ago
- ☆14Dec 26, 2022Updated 3 years ago
- ☆96Dec 25, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- JADX-gui scripting plugin for dynamic decompiler manipulation☆726Feb 5, 2024Updated 2 years ago
- IDA plugin to make classes automatically☆20Oct 31, 2024Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆161Dec 13, 2023Updated 2 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆141Dec 7, 2024Updated last year
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- ☆34May 18, 2023Updated 2 years ago
- ☆11Oct 30, 2024Updated last year
- ☆13Dec 22, 2017Updated 8 years ago
- Slim dockerized Android ndk☆12Mar 3, 2023Updated 3 years ago
- ☆137May 1, 2023Updated 2 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Aug 17, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11May 17, 2024Updated last year
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Slides & Hands-on for the reverse engineering workshop☆182Dec 5, 2022Updated 3 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Find and Meet KOLs on Facebook Taiwan president election Analisis by SNA and NLP☆12Dec 29, 2020Updated 5 years ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆51Jan 16, 2025Updated last year
- Mail toolkit for PyCon Taiwan☆11Dec 20, 2024Updated last year