LD_PRELOAD library that adds features to binaries
☆24Mar 17, 2025Updated 11 months ago
Alternatives and similar repositories for enhancer
Users that are interested in enhancer are comparing it to the libraries listed below
Sorting:
- Telegram bot, which sends alerts to a project chat about new merge requests☆10Dec 10, 2022Updated 3 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- The FOSS-Cloud webinterface.☆14Aug 25, 2017Updated 8 years ago
- ☆13Dec 10, 2023Updated 2 years ago
- Gitlab bot platform☆11Mar 21, 2025Updated 11 months ago
- ☆11May 12, 2015Updated 10 years ago
- Zyxel password decrypter☆44May 3, 2022Updated 3 years ago
- My CTF Challenge☆11Feb 5, 2026Updated last month
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- NAT打洞转发数据☆13Dec 23, 2023Updated 2 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- VaniSSH is a simple tool for generating vanity SSH public keys that start, contain, or end with specified strings.☆19Sep 21, 2025Updated 5 months ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- HITCON 2025 x DEVCORE Wargame☆15Sep 8, 2025Updated 5 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- Cross-platform C library for recursively traversing directory contents☆14Feb 22, 2026Updated last week
- Alt+Shift keyboard layout switcher GNOME Shell Extension☆14Oct 12, 2025Updated 4 months ago
- Control your SOMFY blinds with http commands, using a cheap NodeMCU microcontroller and an RF transmitter.☆11Jan 5, 2019Updated 7 years ago
- Подробнее в блоге ->☆11Jul 12, 2019Updated 6 years ago
- Pure Go GOST Cryptographic Functions Library☆13Jan 17, 2025Updated last year
- ☆14Jul 1, 2025Updated 8 months ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- ICPC codebook used by kiseki☆11Nov 11, 2024Updated last year
- Restrictive validator of pushed commits, titles, branches, names etc.☆10Nov 19, 2015Updated 10 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Dec 3, 2024Updated last year
- ☆11Apr 10, 2021Updated 4 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Jun 27, 2019Updated 6 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- ☆12Nov 20, 2022Updated 3 years ago