Tompazi / confundoLinks
Generate similar looking strings with similar looking Unicode characters.
☆14Updated 8 years ago
Alternatives and similar repositories for confundo
Users that are interested in confundo are comparing it to the libraries listed below
Sorting:
- ☆28Updated 8 years ago
- Detect sandbox by cursor movement speed☆52Updated 3 years ago
- hax 'n shit☆121Updated 10 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- The autoexpect of pwntools☆18Updated 7 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Updated 7 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆95Updated last month
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- ☆20Updated 6 years ago
- exploit for CVE-2018-4193☆69Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- ☆21Updated 6 years ago
- Radare 2 wiki☆93Updated 5 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- a fully python Diffie-Hellman Library☆52Updated 7 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 2 months ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 8 years ago
- ☆101Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 11 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- ☆28Updated 2 months ago