Basic tutorials for reverse engineer with radare2
☆60Mar 17, 2019Updated 6 years ago
Alternatives and similar repositories for survival-guide-radare2
Users that are interested in survival-guide-radare2 are comparing it to the libraries listed below
Sorting:
- Tools to search through massive amounts of data☆21Oct 20, 2025Updated 4 months ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- Analyzing AD domains for security risks related to user accounts☆64Nov 11, 2022Updated 3 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A lab environment for learning about MSTICPy☆38Feb 3, 2023Updated 3 years ago
- ☆15Sep 4, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- (DEPRECATED) Python bindings for Broccoli☆13Apr 26, 2019Updated 6 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- Saltstack workshop with hands on demo. The workshop sets you up with a running Saltstack cluster on your laptop and walks through key con…☆13Oct 11, 2017Updated 8 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- ☆12Jan 12, 2023Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆10Nov 26, 2020Updated 5 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 5 months ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 10 months ago
- A basic python based tool for domain ℹ️ information gathering. I am working 💻 on collecting information related to domain whois, history…☆12Jan 11, 2026Updated last month
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year