CounterHack / mandrakeLinks
A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021
☆27Updated 3 years ago
Alternatives and similar repositories for mandrake
Users that are interested in mandrake are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Tools for offensive security of NetBackup infrastructures☆42Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- Deployment code for ashirt-server☆20Updated 2 months ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated last month
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Tools that trigger False Positive AV alerts☆53Updated last year
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- A VS Code extension to preview XML nmap output☆44Updated 10 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 2 months ago
- ☆21Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Public repository for Red Canary Research☆38Updated 5 years ago
- ☆15Updated 3 years ago
- ☆108Updated 4 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated last month
- The Cloud Blocker☆108Updated 10 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆91Updated 3 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- Red team oriented key finder and correlator☆21Updated last month
- ☆24Updated last year
- Continuous kerberoast monitor☆45Updated 2 years ago