Insomnihack / Insomnihack-2015View external linksLinks
Repository for Insomni'hack finals 2015
☆22Mar 30, 2015Updated 10 years ago
Alternatives and similar repositories for Insomnihack-2015
Users that are interested in Insomnihack-2015 are comparing it to the libraries listed below
Sorting:
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- ☆29Jul 24, 2025Updated 6 months ago
- implement a vba interpreter in java☆21Dec 12, 2017Updated 8 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- "Polymorphic" shellcode generator (x86)☆25Oct 28, 2014Updated 11 years ago
- ☆49Feb 16, 2018Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- An eBPF detection program for CVE-2022-0847☆29Jul 5, 2022Updated 3 years ago
- A collection of code snippets used in blog posts.☆54Aug 29, 2025Updated 5 months ago
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- ☆27Oct 1, 2025Updated 4 months ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 8 years ago
- (mostly web related) web challenge writeups between 2011 and 2015☆21Jan 17, 2023Updated 3 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆36Mar 4, 2025Updated 11 months ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- A Splunk Technology Add-on to forward filtered ETW events.☆30Oct 14, 2020Updated 5 years ago
- ☆30Jul 18, 2025Updated 6 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- AI Agent for Threat Modeling☆13May 27, 2025Updated 8 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago