Exein-io / exein
☆229Updated this week
Related projects: ⓘ
- https://free.edr.sg☆25Updated 2 years ago
- ☆91Updated 3 years ago
- Format SSSD Raw Kerberos Payloads into CCACHE files for use on Windows systems☆35Updated 3 years ago
- Speechly Command Line Interface☆67Updated 10 months ago
- This is a project from FINOS Voice program to define a standard for call metadata.☆25Updated last year
- Delivering open source software development best practices while enforcing security and legal compliance for the financial services indus…☆50Updated 7 months ago
- ☆180Updated this week
- PANDORA - Predictive Analytics aNd Data Oriented Research Applications☆134Updated 4 months ago
- A collection of slides from Singular Security Lab.☆326Updated last week
- SunBurst DGA Decode Script☆206Updated 3 years ago
- ☆369Updated 2 years ago
- PoC exploits I wrote. They're as is and I will not offer support☆273Updated 4 months ago
- A Static Site Generator designed for Markdown-based content with a focus on simplicity and performance.☆309Updated last year
- ☆32Updated 3 years ago
- Slides and stuffs of the meetings during the 2018☆13Updated 2 years ago
- A happy heap editor to support your exploitation process☆196Updated 3 years ago
- CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule☆207Updated 3 years ago
- The Pulley ShakeSearch Take-home Challenge☆62Updated last year
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆70Updated 3 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆312Updated this week
- LKRG bypass methods☆69Updated 4 years ago
- ☆94Updated last year
- A de-socketing library for fuzzing.☆130Updated last week
- ☆89Updated this week
- Emulation and Feedback Fuzzing of Firmware with Memory Sanitization☆155Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆725Updated 3 years ago
- A fuzzing framework for network servers☆114Updated 5 years ago
- ☆316Updated 3 years ago
- ☆150Updated 2 years ago
- Collection of DBI evasion techniques☆14Updated 2 years ago