A project in Golang that will create prefix-based magic MD5 hashes for type juggling.
☆20Jul 29, 2018Updated 7 years ago
Alternatives and similar repositories for MD5-Magic-File-Generator
Users that are interested in MD5-Magic-File-Generator are comparing it to the libraries listed below
Sorting:
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- crosstool-ng project that configures a toolchain for the Mazda Connect CMU☆13Sep 22, 2025Updated 5 months ago
- ☆14Apr 7, 2018Updated 7 years ago
- A simple implementation of an mDNS (multicast Domain Name System) server.☆18Jul 31, 2020Updated 5 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Elixir time zone support for your OS-supplied zoneinfo files☆27Jun 26, 2024Updated last year
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Jul 4, 2018Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- Radare2 plugin to parse modern iOS 64-bit kernel caches☆28Mar 10, 2019Updated 6 years ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Jul 22, 2017Updated 8 years ago
- Homebrew exploit for 3.0.0 (source code, historical purposes)☆65Apr 25, 2018Updated 7 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Mar 13, 2018Updated 7 years ago
- PowerControl is a library that enables runtime configuration of embedded linux for power conservation or performance via native elixir.☆34Mar 1, 2019Updated 7 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)☆73Jun 5, 2018Updated 7 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Base Nerves system configuration for the BeagleBone-based boards☆37Feb 17, 2026Updated last week
- Decompile Elixir modules to Erlang abstract code☆36Feb 2, 2022Updated 4 years ago
- Demo of CloudPets toy functionality using Web Bluetooth☆31Mar 8, 2017Updated 8 years ago
- Trying to hack into keyboards☆86Nov 29, 2018Updated 7 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- Remote thread injected DLL libraries, support for windows 32-bit and 64-bit platforms☆33Feb 6, 2015Updated 11 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- A tiny ASCII fantasy console☆11Nov 13, 2025Updated 3 months ago
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- CHScrobbler is a small Java app that allows you to scrobble your Now Playing track on Clone Hero to last.fm.☆11Jan 17, 2024Updated 2 years ago
- Some examples of integrations with Transcend in various languages.☆11Dec 22, 2025Updated 2 months ago
- Get Group Policy information from ADMX files.☆11Jan 22, 2021Updated 5 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- A very personal list of web resources focused on Geospatial Data Science.☆17Jul 24, 2025Updated 7 months ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago