RASP project for Android app protection
☆14Oct 11, 2024Updated last year
Alternatives and similar repositories for Helldroid
Users that are interested in Helldroid are comparing it to the libraries listed below
Sorting:
- A websocket-based reverse (javascript) shell for XSS attacks.☆30Sep 2, 2022Updated 3 years ago
- A simple tool to detect vulnerabilities described here https://portswigger.net/research/browser-powered-desync-attacks.☆35Aug 30, 2022Updated 3 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- McAfee Active Response (MAR) client library for use with the OpenDXL Python Client☆10Mar 17, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- My personal Visual Studio Code settings.☆10Sep 27, 2022Updated 3 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- decompiled pegasus_spyware☆14Jul 31, 2021Updated 4 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Simple tool for exploiting JWT vulnerabilities☆12Dec 1, 2025Updated 3 months ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 5 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Una super pragmática selección de herramientas Javascript para distintos tipos de proyectos.☆10Aug 2, 2020Updated 5 years ago
- experimental wildcard subdomain filtering prototype☆16Aug 5, 2023Updated 2 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- ☆19Apr 16, 2025Updated 10 months ago
- Everything you need to build and run Linux and Android kernels for exploit development☆17Feb 25, 2024Updated 2 years ago
- BcryptMontoya is a powerful plugin for Burp Suite that allows you to effortlessly modify HTTP requests and responses passing through the …☆15Jan 12, 2026Updated last month
- Transforme imagens e vídeos comuns em obras-primas de alta definição com o Oculus! Utilizando poderosos modelos de Redes Neurais Profunda…☆17Feb 14, 2024Updated 2 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Quickly find all identities someone has used on their Github commits☆17Jul 28, 2024Updated last year
- Tools and information about RingZer0CTF.com☆11Jul 21, 2023Updated 2 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- Clojure interface for Jazzer☆15Jan 7, 2022Updated 4 years ago