The author is lazy, nothing writen.
☆29Mar 25, 2023Updated 2 years ago
Alternatives and similar repositories for Insightface-Attack
Users that are interested in Insightface-Attack are comparing it to the libraries listed below
Sorting:
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- CTF box with most tools installed☆89Aug 22, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- A simple demo to autorun beef modules.☆16Aug 19, 2023Updated 2 years ago
- A collection of SSL/TLS security related resources.☆56Jan 13, 2025Updated last year
- Signedness-Agnostic Strided-Interval☆38Jun 21, 2019Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- source code of XCTF 2019 Final web task "tfboys"☆30Nov 21, 2022Updated 3 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- A Webkit RCE exploit and an SBX bug☆34Jun 8, 2019Updated 6 years ago
- Fuzzilli For quickjs☆28Sep 16, 2019Updated 6 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- Slow llvm tracing for the masses☆14Feb 22, 2020Updated 6 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago
- RISCV lock-step checker based on Spike☆14Mar 6, 2026Updated 2 weeks ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Wrapper around Ghidra's analyzeHeadless script☆13Feb 5, 2022Updated 4 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Feb 24, 2021Updated 5 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆56Jul 8, 2022Updated 3 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- ☆32Jun 10, 2020Updated 5 years ago
- A fake JDBC driver that allows OS command execution.☆125Oct 2, 2022Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Burp extension☆58Jun 18, 2018Updated 7 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 8 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago