Binary Exploitation and Reverse-Engineering (from assembly into C)
☆71May 27, 2021Updated 4 years ago
Alternatives and similar repositories for OverRide
Users that are interested in OverRide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 5 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Dec 14, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Mar 27, 2025Updated last year
- Basic BIOS emulator for Unicorn Engine.☆101Aug 2, 2021Updated 4 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 5 months ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- macOS persistence tool☆228Feb 9, 2022Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆81Sep 29, 2020Updated 5 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆182Apr 10, 2025Updated last year
- Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis.☆21Apr 11, 2023Updated 3 years ago
- ☆46Apr 3, 2019Updated 7 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.☆39Aug 30, 2022Updated 3 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Jun 30, 2020Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Dec 29, 2021Updated 4 years ago
- ☆109Oct 14, 2021Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆100Sep 15, 2025Updated 7 months ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆280Aug 4, 2021Updated 4 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ADDS (Active Directory Domain Services)☆28Mar 25, 2026Updated 3 weeks ago