MXall0c / caulderaView external linksLinks
Distillations and expansions on Rocktastic12a
☆16Feb 5, 2026Updated last week
Alternatives and similar repositories for cauldera
Users that are interested in cauldera are comparing it to the libraries listed below
Sorting:
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37May 31, 2020Updated 5 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- Rethinking the User Interface of AI☆28Updated this week
- Hashcat Benchmark Comparison☆28Jun 28, 2021Updated 4 years ago
- ☆13Nov 5, 2024Updated last year
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆37Oct 21, 2020Updated 5 years ago
- This repo is dedicated to a powerpoint exploit☆34Dec 11, 2020Updated 5 years ago
- ☆16May 13, 2021Updated 4 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Script for filtering roms depending on the name pattern☆15Oct 30, 2018Updated 7 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- ☆10Jan 2, 2017Updated 9 years ago
- MiddleWare for interfacing with IoT SAFE on eSIMs.☆10Jul 21, 2021Updated 4 years ago
- 🚩 [RETIRED]Zillah free theme☆11Aug 6, 2019Updated 6 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- A simple Sinatra app to test when an image is opened.☆11Feb 6, 2014Updated 12 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆18Jan 4, 2026Updated last month
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- BookWorm: A Dataset for Character Description and Analysis [EMNLP Findings 2024]☆14Feb 28, 2025Updated 11 months ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Component Services Volatile Environment LPE☆13Jun 28, 2025Updated 7 months ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- An information screen using the NS API designed as a small Raspberry Pi web app☆10Feb 22, 2017Updated 8 years ago
- Examples of transmitting computer data over radio waves☆12Dec 11, 2017Updated 8 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Modified Beam Search with periodical restart☆12Sep 12, 2024Updated last year
- Copy-on-write fork()-like memory dump using Process Snapshotting APIs☆13Jul 23, 2017Updated 8 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- What Would Portland Do? Generative agent experience☆13Mar 13, 2024Updated last year