Shikra (http://int3.cc/products/the-shikra) programming utility
☆44Jan 30, 2021Updated 5 years ago
Alternatives and similar repositories for shikra-programmer
Users that are interested in shikra-programmer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Aug 15, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆49Jun 5, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- CBOR version of the JOSE specifications☆14Apr 4, 2017Updated 9 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- Collection of misc (mostly JTAG and Serial Wire Debug) adapters.☆13Dec 13, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- OWASP Web Application Testing Cheat Sheet converted to tool formats☆25Jan 20, 2017Updated 9 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 10 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆22Nov 9, 2021Updated 4 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆96Mar 27, 2018Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13Jul 9, 2017Updated 8 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- A PoC script for reading and writing HID iClass credentials using an iClass RW device over serial☆15May 12, 2014Updated 11 years ago
- USB Full-Speed (12Mbps) protocol analyzer for the DSO Quad☆21Jan 12, 2013Updated 13 years ago
- A lightweight packet capture application☆12Oct 16, 2014Updated 11 years ago
- The USB host security assessment tool☆286Nov 28, 2018Updated 7 years ago