A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021
☆27Mar 9, 2022Updated 3 years ago
Alternatives and similar repositories for mandrake
Users that are interested in mandrake are comparing it to the libraries listed below
Sorting:
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- CVE-2021-4034 POC exploit☆36Jan 28, 2022Updated 4 years ago
- quotes i like.☆16Aug 1, 2019Updated 6 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Nov 12, 2018Updated 7 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Apr 21, 2021Updated 4 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Verilog implementation of the 32-bit version of the Blake2 hash function☆21Dec 17, 2025Updated 2 months ago
- ☆23Jul 4, 2025Updated 7 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Feb 8, 2022Updated 4 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Collection of hashcat lists and things.☆50Dec 18, 2019Updated 6 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- Windows 10 De-Clutter script☆25Jul 5, 2020Updated 5 years ago
- A Burp Pro extension that adds log4shell checks to Burp Scanner.☆26Dec 12, 2021Updated 4 years ago
- ☆29Jan 19, 2023Updated 3 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- POC tool to abuse windows server failover clusters☆55Aug 7, 2025Updated 6 months ago
- A Spicy protocol analyzer for WireGuard☆29Aug 11, 2020Updated 5 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆33Nov 2, 2020Updated 5 years ago