FuzzySecurity / BinaryNinja-Themes
Custom Binary Ninja Themes
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for BinaryNinja-Themes
- An injector that use PT_LOAD technique☆11Updated last year
- Ansible build for Afl++ Frida-Mode☆22Updated 5 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 6 months ago
- ☆12Updated 2 years ago
- ☆17Updated last year
- OSED Practice binary☆24Updated 11 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- ☆16Updated last year
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Use WordPress pingback.ping to transfer files.☆17Updated 8 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- A simple Meterpreter stager written in Rust.☆28Updated 2 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 5 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 4 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆19Updated 7 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆12Updated 6 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year
- Red Team Projects with chat.openai.com.☆17Updated last year
- Monitor your target continuously for new subdomains!☆26Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- ☆17Updated last year
- Golang Shlyuz Implant Implementation☆12Updated last year
- x86_64 LKM linux rootkit☆15Updated last year