Memory dump and Sample analysis tool
☆18Mar 17, 2025Updated 11 months ago
Alternatives and similar repositories for deject
Users that are interested in deject are comparing it to the libraries listed below
Sorting:
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated 10 months ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Blackbird OSINT tool FrontEnd React Project☆13Mar 6, 2024Updated last year
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago
- Chef receipe to setup L2TP over IPSec VPN, or IPSec tunneling site-to-site VPN using openswan.☆17Jun 12, 2015Updated 10 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Using a proxy d3d11 dll and function hooking to inject triangle drawing code into Skyrim☆13Jul 12, 2021Updated 4 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Math shit - Variadic vector and polygon math, statistical analysis etc☆13Aug 26, 2019Updated 6 years ago
- Your multipurpose, open source Discord bot.☆12Updated this week
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- ☆12Sep 21, 2021Updated 4 years ago
- Plugins for Vencord☆13Jul 16, 2024Updated last year
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- ☆11Apr 24, 2020Updated 5 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- Inject scripts into gzipped pages without decompression☆14Feb 4, 2026Updated 3 weeks ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 2 months ago
- School Project for Course "System Programming"☆15Jan 16, 2022Updated 4 years ago
- Multitool for Windows native find + replace bytes in hex format☆16Jan 22, 2026Updated last month
- Vanilla JS sound mixer☆47Oct 13, 2025Updated 4 months ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- ☆12Apr 22, 2025Updated 10 months ago
- Slides, codes, and materials related to my courses☆15Dec 19, 2025Updated 2 months ago