Tools I wrote for personal use in C, Python, Powershell, Bash, ...
☆46Dec 14, 2018Updated 7 years ago
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Offensive tool for fileless lateral movement on Windows networks☆27May 7, 2024Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- https://exploit-exercises.com/fusion/☆20Dec 29, 2015Updated 10 years ago
- A framework for parsing binary data.☆18Aug 12, 2022Updated 3 years ago
- Cobalt Strike二次开发笔记,记录功能和思路☆16Jul 9, 2022Updated 3 years ago
- ELF patching library in Python☆25Mar 15, 2021Updated 5 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated 3 months ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- ☆15Mar 24, 2016Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Personal scripts for binary ninja☆27Jul 24, 2019Updated 6 years ago
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- ELF header abuse☆50Mar 23, 2016Updated 10 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- A Nmap script optimized for Hack the Box and CTFs☆15Feb 22, 2021Updated 5 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆23Jun 20, 2025Updated 10 months ago
- Safe Rust bindings to the DynamoRIO dynamic binary instrumentation framework.☆22Mar 8, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- Code of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"☆26Jan 1, 2026Updated 4 months ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- Another linux ELF packer to evade hash detection.☆35Oct 22, 2021Updated 4 years ago
- IP camera bruteforcer, 32 bit version☆14Mar 24, 2016Updated 10 years ago
- fastjson_rce工具,不用搭建HTTP服务,不受JDK版本限制☆10Nov 25, 2019Updated 6 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Nov 29, 2019Updated 6 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- Metasploit Modules Development☆71Aug 6, 2021Updated 4 years ago
- ☆50Sep 11, 2019Updated 6 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Changes MDM registry keys without the need for an MDM server to quickly disable WiFi-Sense and handle other potential security concerns i…☆15Aug 10, 2015Updated 10 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago