bSidesLisbon 2016 event contents
☆10Dec 14, 2016Updated 9 years ago
Alternatives and similar repositories for 2016
Users that are interested in 2016 are comparing it to the libraries listed below
Sorting:
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- An implementation of the NASA Task Load Index (NASA-TLX).☆17Jan 2, 2013Updated 13 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Python Tools for the MCP23008 and MCP23017 I2C IO Expanders☆17Oct 3, 2013Updated 12 years ago
- Bundling and running Node.js from within a Firefox extension☆27Dec 8, 2011Updated 14 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- A guided tour of docker basics☆24Nov 2, 2017Updated 8 years ago
- GazeMetrics allows for the easy extraction of data samples and calculation of accuracy and precision of VR HMD based eye trackers.☆14Oct 11, 2023Updated 2 years ago
- Replay HAR logs☆13Apr 14, 2015Updated 10 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Personal vim configuration files including setup file.☆15Sep 3, 2024Updated last year
- once and for all☆10Oct 30, 2021Updated 4 years ago
- use ambiguous HTTP to circumvent security systems☆94Sep 18, 2023Updated 2 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Tobii Eye Tracker 4C Naïve Solution☆19Feb 25, 2021Updated 5 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Resources which may be useful for PhD candidates in computing-based fields.☆18Sep 4, 2025Updated 6 months ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆20Jan 23, 2024Updated 2 years ago
- ☆11Mar 30, 2017Updated 8 years ago
- expose a file system over http☆29Sep 18, 2018Updated 7 years ago
- Open Network Inspection Command Suite☆10Dec 4, 2022Updated 3 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Unite Seoul 2025 Samples for Motion Tracking Session☆19Apr 17, 2025Updated 11 months ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- Toolbox for processing, visualising, comparing and generating data related to gaze in 360 contexts (VR notably)☆27Jun 12, 2025Updated 9 months ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- Updated the original Card Wars to work on modern Android phones☆18Aug 12, 2024Updated last year