☆21Jul 2, 2024Updated last year
Alternatives and similar repositories for cyber-attacks-and-defense
Users that are interested in cyber-attacks-and-defense are comparing it to the libraries listed below
Sorting:
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- My personnal repository☆10Sep 2, 2025Updated 6 months ago
- ☆12Aug 3, 2025Updated 7 months ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆47Feb 6, 2026Updated last month
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Apr 25, 2025Updated 10 months ago
- 一个用于检测安卓app自身是否被uprobe挂载的示例项目☆27Jul 4, 2025Updated 8 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- You don't need install any wdk for development kernel driver☆24Jul 20, 2018Updated 7 years ago
- Free and open binary exploitation course for 2024 NCKUCTF☆44Oct 2, 2024Updated last year
- FSOP Again☆35Apr 3, 2022Updated 3 years ago
- Linux CS:GO external cheats with X11 overlay.☆22Jul 7, 2021Updated 4 years ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Nov 30, 2025Updated 3 months ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- A tracer based on frida for XPC messages in iOS and macOS.☆35May 28, 2023Updated 2 years ago
- CS:GO Linux Java external cheatpack☆17Oct 1, 2023Updated 2 years ago
- A Counter-Strike: Global Offensive Training Software in tribute of Terry A. Davis, the maker of TempleOS.☆28Oct 7, 2024Updated last year
- Injecting into SELinux-protected system service processes under root on Android.☆50Feb 28, 2024Updated 2 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- MFEA 2 (or MFEA-II). Multifactorial Evolutionary Optimization with Online Transfer Parameter Estimation in Python☆40Dec 24, 2019Updated 6 years ago
- Udemy – Linux Heap Exploitation☆54Jun 14, 2021Updated 4 years ago
- windows kernel deriver loader(pro)☆46Feb 4, 2021Updated 5 years ago
- page table manipulation to gain physical r/w☆44May 7, 2024Updated last year
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- ☆49Dec 4, 2023Updated 2 years ago
- Alina Spark - Point of Sales Trojan☆49Feb 25, 2015Updated 11 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆61Dec 12, 2023Updated 2 years ago
- Challenge source code and author write-ups for KalmarCTF☆70Jan 7, 2026Updated 2 months ago
- force delete runing .exe application file.or delete any locked file☆74Mar 21, 2023Updated 2 years ago
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 6 months ago
- Windows driver including couple different techniques for file removal when regular operation isn't possible.☆71Feb 11, 2016Updated 10 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Source code for the DEF CON 32 CTF Qualifiers.☆76May 24, 2024Updated last year
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago
- Java Based Cross-Platform CSGO Offset and Netvar Scanner☆28Feb 25, 2018Updated 8 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- Escape from Tarkov QEMU Cheat☆72Jul 10, 2022Updated 3 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆94Sep 12, 2019Updated 6 years ago
- Just my first IOCTL try☆75Jul 9, 2020Updated 5 years ago