Binary Risk Intelligence
☆153Apr 19, 2024Updated last year
Alternatives and similar repositories for binary-risk-intelligence
Users that are interested in binary-risk-intelligence are comparing it to the libraries listed below
Sorting:
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- ☆24Sep 12, 2024Updated last year
- Watermark For Text☆22Mar 6, 2025Updated last year
- A humble tool to help you presenting ideas by writing Swift☆12Jul 25, 2019Updated 6 years ago
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆31Jan 11, 2026Updated last month
- Slides of "Everything in Rust" of COSCUP 2019☆11Aug 25, 2019Updated 6 years ago
- CO-RE code for the Netdata eBPF plugin.☆16Mar 2, 2026Updated last week
- ☆34Apr 14, 2025Updated 10 months ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆144Apr 15, 2024Updated last year
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 3 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- 探究底层机制:二进制安全☆35Sep 1, 2023Updated 2 years ago
- Security research helper for CLFS drivers☆16Sep 5, 2024Updated last year
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆14Dec 18, 2023Updated 2 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 9 months ago
- A tool for adding new lines to files, skipping duplicates and written in Rust!☆19May 8, 2025Updated 10 months ago
- ☆21Jun 3, 2021Updated 4 years ago
- AsteriskPassword,基于C++&MFC开发的星号密码查看器☆98Jul 14, 2023Updated 2 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Open KLara Project☆36Feb 12, 2026Updated 3 weeks ago
- ☆38Apr 5, 2024Updated last year
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- CNVD-2023-27598☆18Apr 20, 2023Updated 2 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- Reverse-engineer a Dockerfile from a Docker image.☆15Nov 7, 2023Updated 2 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Middleware della CIE per MacOS (Carta di identità elettronica)☆21Aug 5, 2025Updated 7 months ago