CounterHack / mandrakeLinks
A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021
☆27Updated 3 years ago
Alternatives and similar repositories for mandrake
Users that are interested in mandrake are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
- Red team oriented key finder and correlator☆20Updated 3 months ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated this week
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- C# User Simulation☆33Updated 3 years ago
- Tools that trigger False Positive AV alerts☆52Updated 10 months ago
- ☆24Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆90Updated 3 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 7 months ago
- ☆15Updated 3 years ago
- Deployment code for ashirt-server☆20Updated last week
- A VS Code extension to preview XML nmap output☆44Updated 8 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆28Updated last week
- ☆20Updated 3 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- Continuous kerberoast monitor☆45Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago