Generate similar looking strings with similar looking Unicode characters.
☆14Mar 2, 2017Updated 9 years ago
Alternatives and similar repositories for confundo
Users that are interested in confundo are comparing it to the libraries listed below
Sorting:
- ☆11Jun 9, 2020Updated 5 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Completing Advent of Code 2021 in Common Lisp loop macro.☆10Jan 9, 2022Updated 4 years ago
- 64 bits of core memory and LEDs to interact with directly using a magnetic wand.☆16Oct 1, 2025Updated 5 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- A repository for the Automatic IIUM Schedule Formatter project☆11Oct 16, 2022Updated 3 years ago
- The fractal land generator☆15Aug 3, 2019Updated 6 years ago
- Raspberry Pi Zero Cookbook by Packt☆12Jan 30, 2023Updated 3 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Marlin Simulator UI☆15Feb 19, 2026Updated last week
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Circularly readable streams for Common Lisp.☆16Dec 2, 2016Updated 9 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- Tree-automata-based run-time type constraints for miniKanren☆14Aug 3, 2023Updated 2 years ago
- A library of ASCII encoding schemes for binary data, written in Common Lisp☆17Apr 1, 2017Updated 8 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- The BASIC-BINARY-IPC system provides an interface for performing inter process communication using IPv4 or local streams. The interface f…☆21Nov 7, 2021Updated 4 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- Code in QASM for quantum circuits and algorithms☆12Apr 4, 2017Updated 8 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- A Modular Audio Synthesizer Engine implemented in Common Lisp☆10Jun 20, 2025Updated 8 months ago