☆21Apr 5, 2023Updated 2 years ago
Alternatives and similar repositories for InfinityGauntlet
Users that are interested in InfinityGauntlet are comparing it to the libraries listed below
Sorting:
- A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android.☆33Feb 9, 2022Updated 4 years ago
- One-click extraction of fully encrypted Fudan card data☆45Apr 7, 2025Updated 10 months ago
- ☆12Aug 15, 2024Updated last year
- 每天一个技术点☆10Sep 10, 2023Updated 2 years ago
- ☆14Feb 25, 2026Updated last week
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- DiscreteTom's Blog Boilerplate.☆10Mar 6, 2023Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- ☆18May 30, 2025Updated 9 months ago
- AWD 自动化攻击框架☆10Jun 21, 2019Updated 6 years ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- some useful configs☆10Oct 7, 2025Updated 4 months ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- 哥斯拉 Suo5 一款高性能 HTTP 代理隧道工具☆15Sep 24, 2023Updated 2 years ago
- UEFI keylogger prototype☆10May 10, 2017Updated 8 years ago
- red or blue☆14Apr 20, 2023Updated 2 years ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- Book Notes on "Design and Implementation of a 64-bit Operating System"☆14Jun 12, 2024Updated last year
- Tools for communicating with Intel Management Engine through MEI (HECI)☆13Jul 27, 2017Updated 8 years ago
- ast pattern matching with automated structure recovery for hex-rays decompiler☆29Feb 16, 2026Updated 2 weeks ago
- Jupyter Kernel for CodeQL☆15Feb 26, 2025Updated last year
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.☆11Aug 16, 2024Updated last year
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- ☆16Dec 3, 2020Updated 5 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- 一键安装CTF工具☆20Feb 1, 2026Updated last month
- Edit the bios of your RTX3090☆18Jan 8, 2021Updated 5 years ago
- python3 version of cloacked-pixel.☆11Oct 8, 2022Updated 3 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- ☆16Jan 9, 2025Updated last year
- ☆10Mar 3, 2021Updated 5 years ago
- This script will not work with the latest version of chrome☆13May 11, 2025Updated 9 months ago
- a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754☆17Mar 27, 2018Updated 7 years ago
- Software BCH ECC generation for Broadcom SOC NAND controllers.☆11Oct 15, 2017Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago