ColumPaget / enhancerView external linksLinks
LD_PRELOAD library that adds features to binaries
☆24Mar 17, 2025Updated 10 months ago
Alternatives and similar repositories for enhancer
Users that are interested in enhancer are comparing it to the libraries listed below
Sorting:
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 4 months ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- ICPC codebook used by kiseki☆11Nov 11, 2024Updated last year
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Feb 14, 2019Updated 6 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 4 months ago
- HITCON 2025 x DEVCORE Wargame☆15Sep 8, 2025Updated 5 months ago
- ☆30Nov 25, 2025Updated 2 months ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- ☆14Jul 1, 2025Updated 7 months ago
- Zyxel password decrypter☆44May 3, 2022Updated 3 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last week
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 7 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Dec 3, 2024Updated last year
- A Collection of Solutions and Algorithms for Competitive Programming.☆14Jan 25, 2026Updated 2 weeks ago
- ☆12Aug 22, 2022Updated 3 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 9 months ago
- ☆12Nov 20, 2022Updated 3 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- ☆11Apr 10, 2021Updated 4 years ago
- ☆11Nov 12, 2023Updated 2 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- 使用動態規劃 (Dynamic Programming) 計算肯德基最佳優惠方案☆11Oct 18, 2022Updated 3 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆14Nov 2, 2023Updated 2 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 3 years ago
- A compiler for microarchitectural weird machines☆18Aug 10, 2024Updated last year
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- ☆12Jul 31, 2024Updated last year
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Jan 31, 2024Updated 2 years ago
- Source code for the DEF CON 33 CTF Finals.☆25Aug 26, 2025Updated 5 months ago
- Archive of AAA CTF 2025 (XCTF competition)☆10May 7, 2025Updated 9 months ago