A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021
☆27Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for mandrake
Users that are interested in mandrake are comparing it to the libraries listed below
Sorting:
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- libvirt Puppet Module☆23Dec 23, 2014Updated 11 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Game Board for NorthSec's Hacker Jeopardy since 2017☆14May 17, 2025Updated 10 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- A bot that watches a website or GitHub assets for changes and communicates them to Slack.☆11Apr 5, 2019Updated 6 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Oct 2, 2019Updated 6 years ago
- MuonFP is an enterprise ready, TCP passive fingerprinter written in Rust that has no external dependencies such as WireShark or other ope…☆29Dec 12, 2025Updated 3 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- ☆13Dec 11, 2025Updated 3 months ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 9 months ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Sample Node.js application for demonstration Cloud Foundry features.☆12Jan 29, 2016Updated 10 years ago
- Lightweight log shipper for logstash☆33Jul 25, 2012Updated 13 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- 🗃 Check the status of multiple git repositories in a folder☆12Feb 19, 2023Updated 3 years ago
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 5 months ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- Windows named pipes bindings for tokio☆12Sep 26, 2018Updated 7 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- A malicious BGP daemon that forces a TCP zero window edge case☆20Apr 21, 2021Updated 4 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- A wrapper around grep, to help you grep for things! - Improved version of gf by @tomnomnom.☆62Nov 17, 2023Updated 2 years ago
- PoC for old Binder vulnerability (based on P0 exploit)☆13Oct 27, 2020Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- quotes i like.☆17Aug 1, 2019Updated 6 years ago
- Automatic SQL injection and database takeover tool☆45Nov 27, 2025Updated 3 months ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago