DEbian Cve REproducer Tool
☆27Jan 8, 2026Updated 2 months ago
Alternatives and similar repositories for decret
Users that are interested in decret are comparing it to the libraries listed below
Sorting:
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- Easy crash-reporting for Frida-based applications.☆18Aug 19, 2019Updated 6 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Yara Based Detection Engine for web browsers☆50Sep 5, 2021Updated 4 years ago
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Dump protected files (SAM,SYSTEM,SECURITY) by parsing the raw NTFS partition☆38Nov 11, 2025Updated 4 months ago
- ☆55Oct 12, 2024Updated last year
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- ☆16Mar 12, 2026Updated last week
- ☆11Sep 14, 2020Updated 5 years ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Mar 16, 2026Updated last week
- ☆13May 9, 2017Updated 8 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- Official templates for Spin.☆17May 16, 2020Updated 5 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Files used for various testing methodologies.☆12Updated this week
- UX research on the current state of development of the Bitcoin Lightning Network.☆16Apr 4, 2018Updated 7 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- Rerousces related to time-travel debugging (TTD)☆33Jan 6, 2026Updated 2 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- public index of IDA Pro plugins☆25Mar 16, 2026Updated last week
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- Anti-Shipping Activity Messages (ASAM) App for iOS displays location and descriptive information about hostile acts against ships and mar…☆17Oct 5, 2019Updated 6 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- ☆24Nov 3, 2022Updated 3 years ago
- Authenticated encryption scheme prover/synthesizer☆16Aug 25, 2022Updated 3 years ago
- ☆21Apr 17, 2023Updated 2 years ago
- Online tool to explore how different ppxs transform the input code☆19Oct 29, 2024Updated last year
- Awesome Secure Coding☆18Feb 13, 2026Updated last month
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37May 30, 2022Updated 3 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆19Nov 28, 2019Updated 6 years ago
- Parses a relative time string and returns a jiff::Zoned object☆36Updated this week
- Bridge between TensorFlow and Google's Private Join and Compute library☆16Dec 27, 2022Updated 3 years ago
- An unofficial Firefox extension for the LibreTranslate API☆14Dec 2, 2022Updated 3 years ago
- Infect to Protect☆15Nov 6, 2018Updated 7 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Write ups for Ph0wn CTF☆47Aug 12, 2025Updated 7 months ago