This repository contains a docker container dedicated to reverse engineering
☆84Oct 4, 2018Updated 7 years ago
Alternatives and similar repositories for reverse-me
Users that are interested in reverse-me are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Oct 4, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- A golang package for retrieving values from the Microsoft LDAP property, `UserAccountControl`☆16Oct 28, 2021Updated 4 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Development repository for the snort cookbook☆27Mar 2, 2026Updated last month
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆20Oct 22, 2019Updated 6 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- ☆15Mar 25, 2017Updated 9 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Custom exploits that I made for Hack The Box machines!☆35Aug 3, 2021Updated 4 years ago
- Liferay puppet example☆15Feb 9, 2015Updated 11 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆15Jul 15, 2018Updated 7 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 4 months ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 7 years ago
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆22Jan 3, 2023Updated 3 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Complete examples of solidity exploits☆13Oct 17, 2017Updated 8 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- OpenCV for Secrest Agents by Packt Publishing☆14Jan 30, 2023Updated 3 years ago
- Tampermonkey script to extract information from Meteor applications☆34Nov 3, 2016Updated 9 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago