Write-ups for FireEye's FLARE-On challenges
☆25Aug 8, 2019Updated 6 years ago
Alternatives and similar repositories for flare-on-challenges
Users that are interested in flare-on-challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- A repository contains all sort of cheat-sheets for various things.☆11Sep 24, 2021Updated 4 years ago
- ☆50Apr 13, 2026Updated 2 weeks ago
- Mortal Kombat GRA files parser. More details at http://blog.rewolf.pl/blog/?p=1837☆16Aug 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Oct 10, 2018Updated 7 years ago
- OSCP guide and Red Team assessment Guide☆38Jul 9, 2020Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- Some web-based ACME tools.☆17Apr 15, 2026Updated 2 weeks ago
- Understanding Linux Kernel Vulnerability☆23Jan 9, 2018Updated 8 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆13Apr 20, 2021Updated 5 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- mod to myaut2exe decompiler☆19Jul 28, 2017Updated 8 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆67Oct 24, 2021Updated 4 years ago
- CTF write-up☆34Jan 11, 2024Updated 2 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆36Apr 24, 2026Updated last week
- JDB++ an jdb extension for easily debugging through smali code☆23Jul 18, 2025Updated 9 months ago
- A simple operating system (SOS) built on top of the seL4 microkernel☆12Mar 3, 2018Updated 8 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆14Feb 19, 2021Updated 5 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆86Apr 13, 2026Updated 2 weeks ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- ☆34Apr 14, 2025Updated last year
- A Python package and command-line interface (CLI) tool for asynchronous OSINT username enumeration using the WhatsMyName dataset☆40Apr 4, 2026Updated 3 weeks ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- ☆15Mar 25, 2017Updated 9 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Symbolic execution engine for Whitespace.☆14May 30, 2021Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆78May 3, 2021Updated 4 years ago
- Example files to experience basic exploit techniques.☆74Apr 29, 2019Updated 7 years ago
- ☆16Sep 3, 2016Updated 9 years ago