Binary Exploitation and Reverse-Engineering (from assembly into C)
☆71May 27, 2021Updated 4 years ago
Alternatives and similar repositories for OverRide
Users that are interested in OverRide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Mar 27, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 5 months ago
- Brutteforce for stego CTFs☆17Nov 2, 2022Updated 3 years ago
- macOS persistence tool☆227Feb 9, 2022Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆81Sep 29, 2020Updated 5 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆182Apr 10, 2025Updated last year
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 3 years ago
- ☆46Apr 3, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆39Aug 30, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Mar 9, 2021Updated 5 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆24Sep 26, 2021Updated 4 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- ☆15Jul 10, 2025Updated 9 months ago
- ☆109Oct 14, 2021Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆43Jan 30, 2022Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆281Aug 4, 2021Updated 4 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ADDS (Active Directory Domain Services)☆28Mar 25, 2026Updated last month
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- 内存加载执行golang elf二进制文件☆29Dec 22, 2021Updated 4 years ago