Binary Golf Grand Prix
☆86Mar 14, 2026Updated 3 weeks ago
Alternatives and similar repositories for BGGP
Users that are interested in BGGP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary Golf Grand Prix☆116Oct 31, 2023Updated 2 years ago
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Binary Golf Examples and Resources☆261Oct 24, 2025Updated 5 months ago
- The malsource dataset☆13Aug 31, 2021Updated 4 years ago
- A collection of interesting ELF files for inspiration and testing☆32Jan 25, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- ☆683Mar 25, 2025Updated last year
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- POC Tiny PE - Example project showing (almost) minimal executable size. Without touching assembly.☆15Mar 16, 2026Updated 3 weeks ago
- A stealthy ELF loader - no files, no execve, no RWX☆173Dec 31, 2023Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- ☆14Sep 19, 2024Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- House of Gods Heap Exploitation Technique☆20Dec 5, 2022Updated 3 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆77Oct 22, 2016Updated 9 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- Memory manipulation library for Linux.☆28Jun 9, 2025Updated 10 months ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Mar 4, 2026Updated last month
- ☆22Aug 15, 2023Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- The xx file format. Turn your hex dumps into art, then into binary data.☆348Jun 12, 2023Updated 2 years ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆81Mar 14, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆82Updated this week
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year
- Got a bogus CVE someone got for a non-vuln? Please share here!☆25Jul 24, 2024Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆134Feb 1, 2026Updated 2 months ago
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- ☆137Dec 5, 2025Updated 4 months ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- PoC for the CVE-2021-4034 vulnerability, affecting polkit < 0.120.☆24Jan 26, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆11Dec 19, 2024Updated last year
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Dec 19, 2017Updated 8 years ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆329Apr 1, 2026Updated last week
- ☆12Nov 12, 2022Updated 3 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- ☆47May 13, 2024Updated last year
- A modern replacement for the Nintendo 64's NUS-CNT serial communication chip.☆31Nov 29, 2020Updated 5 years ago