Introduction to Reverse Engineering Training
☆11Apr 22, 2015Updated 10 years ago
Alternatives and similar repositories for BSidesSF-2015
Users that are interested in BSidesSF-2015 are comparing it to the libraries listed below
Sorting:
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- A collection of custom scripts for use with Hopper disassembler☆24Feb 10, 2015Updated 11 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Feb 24, 2026Updated last week
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆26Jan 18, 2026Updated last month
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- Collection of scripts I use in the Hopper disassembler☆111Nov 20, 2016Updated 9 years ago
- Net::TNS, a Ruby library for connecting to Oracle databases.☆35May 7, 2019Updated 6 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago