Plugin for NOPing instructions in IDA
☆21May 9, 2024Updated last year
Alternatives and similar repositories for NOP_Plugin
Users that are interested in NOP_Plugin are comparing it to the libraries listed below
Sorting:
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- IDA Python scripts☆42Apr 11, 2025Updated 11 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and…☆21Updated this week
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- a IDA plugin helps you to manage your IDA Comments☆25Sep 30, 2024Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- RCE through a race condition in Apache Tomcat☆57Dec 21, 2024Updated last year
- Linux kernel internals' notes☆20Feb 12, 2026Updated last month
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- Reverse Engineering and Debugging Malware☆31Feb 27, 2023Updated 3 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- IDA Map File Symbol Renamer☆25Apr 1, 2025Updated 11 months ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- ApkHack-BackDoor is a shell script that simplifies the process of adding a backdoor to any Android APK file.☆17May 10, 2023Updated 2 years ago
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- ☆16Sep 5, 2024Updated last year
- Filesystem interaction via firebeam virtual machine execution☆34Mar 14, 2026Updated last week
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆15Jul 13, 2023Updated 2 years ago
- ☆12Aug 16, 2024Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago