Tami 4 Edge / Edge+ API In Python
☆33Jun 8, 2024Updated last year
Alternatives and similar repositories for Tami4EdgeAPI
Users that are interested in Tami4EdgeAPI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Sep 12, 2022Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 2 years ago
- Hooking library using Valve's GameOverlayRenderer☆15Aug 19, 2022Updated 3 years ago
- AngrPT recover the Windows Driver's DeviceIoControl Interface and Dependencies for getting higher coverage in Fuzzing Process.☆20Jan 20, 2026Updated 2 months ago
- Retrieves VAC module ice encryption key by reversing the LCG seed that it was generated with☆16Sep 5, 2025Updated 6 months ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Windows kernel ROP-only implant exposing R/W primitives☆48Feb 1, 2026Updated last month
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆27Dec 7, 2021Updated 4 years ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Pine and Frida better together☆15Oct 30, 2024Updated last year
- ☆12Updated this week
- Compare A/AAAA DNS record for any domain in your browser by DoH JSON API.☆12Nov 13, 2023Updated 2 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Rust generators implemented through async/await syntax☆12Sep 29, 2023Updated 2 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- Sigma rules converted for direct use with Zircolite☆14Mar 16, 2026Updated last week
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆41Jan 18, 2025Updated last year
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- A collection of small examples demonstrating various linker features☆12Dec 29, 2018Updated 7 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Jul 27, 2025Updated 7 months ago
- Patch an Electron app to apply your own changes☆16Mar 12, 2026Updated last week
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- ☆48Oct 7, 2022Updated 3 years ago
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- type 1 thin hypervisor written in C++☆17Dec 18, 2024Updated last year
- A trivial raycaster using minifb for rendering/input☆12Jan 2, 2023Updated 3 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- VM for crackmes, just for fun☆14Aug 3, 2023Updated 2 years ago