Binary Golf Grand Prix
☆84Dec 29, 2025Updated 2 months ago
Alternatives and similar repositories for BGGP
Users that are interested in BGGP are comparing it to the libraries listed below
Sorting:
- This extension is meticulously crafted to safeguard users from phishing attempts that replicate the Office365 login interface, particular…☆11Nov 27, 2023Updated 2 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Binary Golf Examples and Resources☆260Oct 24, 2025Updated 4 months ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- ☆667Mar 25, 2025Updated 11 months ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Memory manipulation library for Linux.☆28Jun 9, 2025Updated 8 months ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- Small and lightweight x86-64 VBR bootkit for research purposes☆10Dec 7, 2022Updated 3 years ago
- My personnal repository☆10Sep 2, 2025Updated 5 months ago
- ☆19Jan 31, 2025Updated last year
- House of Gods Heap Exploitation Technique☆19Dec 5, 2022Updated 3 years ago
- CTF solve scripts. Some writeups on my blog, others on my gist. Check the challenge directories for links.☆10Feb 3, 2024Updated 2 years ago
- ☆44Feb 6, 2025Updated last year
- MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It…☆17Dec 19, 2017Updated 8 years ago
- ☆14Sep 19, 2024Updated last year
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Cryptanalysis on differents algorithms with z3 solver sat☆17Aug 5, 2024Updated last year
- Haylou Smart Watch 2 (LS02) reverse-engineering project☆20Jan 24, 2025Updated last year
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Updated this week
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆130Feb 1, 2026Updated last month
- ☆135Dec 5, 2025Updated 2 months ago
- ☆25Jun 2, 2024Updated last year
- a very fast headless DOS emulator for Linux☆24Aug 1, 2025Updated 7 months ago
- ☆19Mar 13, 2022Updated 3 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆21Apr 14, 2025Updated 10 months ago
- ☆22Aug 15, 2023Updated 2 years ago
- ☆84Nov 21, 2024Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆51Nov 7, 2024Updated last year
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Aug 11, 2023Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 8 months ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year