ActionScript3 dynamic instrumentation tool
☆36Mar 15, 2017Updated 9 years ago
Alternatives and similar repositories for reflash
Users that are interested in reflash are comparing it to the libraries listed below
Sorting:
- ☆12Apr 13, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- ☆30May 23, 2017Updated 8 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Nov 24, 2016Updated 9 years ago
- A tool for dumping wtmp files and patching wtmp records☆20Jul 20, 2019Updated 6 years ago
- ☆17Mar 22, 2018Updated 7 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆38Oct 23, 2015Updated 10 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Tools and library to manipulate EFI variables.☆10Mar 13, 2026Updated last week
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- Development moved to https://github.com/mhsys/mh☆14Feb 20, 2018Updated 8 years ago
- Tools for inspecting disk images☆24Nov 23, 2018Updated 7 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆61May 8, 2017Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- Open Mesh OM5P-AC v2 Unlocker (U-Boot 1.1.4 based)☆36Feb 13, 2017Updated 9 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆18Updated this week
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- All the python and Pandas tricks I keep forgetting how to do☆18Oct 17, 2020Updated 5 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Proof of Concept's provided by Source Incite☆37Aug 10, 2017Updated 8 years ago