Shikra (http://int3.cc/products/the-shikra) programming utility
☆44Jan 30, 2021Updated 5 years ago
Alternatives and similar repositories for shikra-programmer
Users that are interested in shikra-programmer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Miscellaneous Tools☆37May 31, 2015Updated 10 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Aug 15, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 12 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆49Jun 5, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 11 years ago
- Google BigQuery API using service account credentials.☆21Feb 22, 2016Updated 10 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- CBOR version of the JOSE specifications☆14Apr 4, 2017Updated 9 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 13 years ago
- A bot that offers sympathy to people who have suffered paper cuts.☆17Oct 6, 2012Updated 13 years ago
- Collection of misc (mostly JTAG and Serial Wire Debug) adapters.☆13Dec 13, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- ☆90Sep 18, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26May 13, 2011Updated 14 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 10 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆97Mar 27, 2018Updated 8 years ago
- ☆27Jan 27, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- LEIA: the Lab Embedded ISO7816 Analyzer A Custom Smartcard Reader for the ChipWhisperer PCB☆23Nov 9, 2021Updated 4 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago