bSidesLisbon 2016 event contents
☆10Dec 14, 2016Updated 9 years ago
Alternatives and similar repositories for 2016
Users that are interested in 2016 are comparing it to the libraries listed below
Sorting:
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- once and for all☆10Oct 30, 2021Updated 4 years ago
- A guided tour of docker basics☆24Nov 2, 2017Updated 8 years ago
- Updated the original Card Wars to work on modern Android phones☆18Aug 12, 2024Updated last year
- Binaryninja AVR architecture plugin with lifting☆45Oct 26, 2023Updated 2 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Sep 26, 2018Updated 7 years ago
- Hide JavaScript inside your GIF and BMP images☆28Aug 23, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- [ WORKING / 08.02.26 ] Fake deafen on discord. You can listen to the others while they think you are deafen :) Enjoy!☆11Feb 17, 2026Updated last week
- Original Card Wars Kingdom Unity Project Folder☆12Oct 31, 2024Updated last year
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Binary Ninja Posters☆35Oct 14, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- N8n script(s) to generate educational brainrot videos☆20Jun 15, 2025Updated 8 months ago
- Network troubleshooting tool.☆13Oct 3, 2016Updated 9 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- ☆13Jan 23, 2026Updated last month
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- use ambiguous HTTP to circumvent security systems☆94Sep 18, 2023Updated 2 years ago
- utility for emulating a USB HID keyboard with the USBArmory☆44Mar 1, 2018Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- ☆12Dec 30, 2025Updated 2 months ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- compact crawling tools written in perl☆10Jul 12, 2016Updated 9 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Real-time phase modulation/granular synthesizer in Python.☆11Aug 28, 2016Updated 9 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago