Repository for Insomni'hack finals 2015
☆22Mar 30, 2015Updated 10 years ago
Alternatives and similar repositories for Insomnihack-2015
Users that are interested in Insomnihack-2015 are comparing it to the libraries listed below
Sorting:
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- A few exercises from Zed Shaw’s “Learn C the Hard Way”☆21Dec 16, 2019Updated 6 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- ☆29Jul 24, 2025Updated 7 months ago
- ☆15Apr 9, 2018Updated 7 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Tool for CVE-2018-16323☆82Jan 17, 2019Updated 7 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Nov 9, 2018Updated 7 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- ☆49Feb 16, 2018Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 4 months ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- A very tiny PHP shell☆27Jan 26, 2012Updated 14 years ago
- A collection of code snippets used in blog posts.☆53Aug 29, 2025Updated 6 months ago
- Making Type Info Library (TIL) file for Apache modules☆58Mar 25, 2021Updated 4 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- (mostly web related) web challenge writeups between 2011 and 2015☆21Jan 17, 2023Updated 3 years ago
- A plugin for the commercial IDA Pro disassembler that warns users if they leave their instance idling for too long.☆31Feb 17, 2026Updated 2 weeks ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago