This python script adds some usefull command to stripped vmlinux image
☆24Sep 18, 2020Updated 5 years ago
Alternatives and similar repositories for gdb_2_root
Users that are interested in gdb_2_root are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 31, 2020Updated 5 years ago
- ☆11Mar 17, 2021Updated 5 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 3 months ago
- Just as root !! Simple su for android , without any Management (Not GUI Confirm).☆25Jun 23, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- GDT (Ghidra Data Type) generated from IDA tils☆21Mar 10, 2023Updated 3 years ago
- Extract cookies from browsers☆19Feb 20, 2024Updated 2 years ago
- A horizontal and vertical web content enumerator☆51Apr 7, 2026Updated last month
- A Burp Suite Professional extension for decrypting/decoding various types of cookies.☆12Jun 12, 2019Updated 6 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- ☆16May 24, 2023Updated 2 years ago
- A command line app to create Gists in Go☆28Apr 16, 2020Updated 6 years ago
- A collection of Writeups and Papers about iOS Security☆29Apr 11, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Jul 12, 2020Updated 5 years ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆15Jun 21, 2022Updated 3 years ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆28Jan 23, 2026Updated 3 months ago
- scripts, snippets etc.☆24Jul 17, 2025Updated 10 months ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆90Nov 16, 2021Updated 4 years ago
- Open methodologies on measuring, documenting and conducting research on information controls, Internet censorship, and online surveillanc…☆16Apr 28, 2026Updated 3 weeks ago
- Automated Firebase recon and security scanner. Extracts from APKs or IPAs and checks for unauthorized read and write access on Firestore,…☆47Apr 30, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Notion as an HTTP proxy☆37Mar 7, 2023Updated 3 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- pocframe是一个基于python3的开源批量POC检测框架,默认使用协程异步请求,支持多线程并发,支持多种指定目标方式,可用于批量POC检测,也可根据需要扩展功能。☆13Mar 20, 2021Updated 5 years ago
- Utilities to help injecting libraries and frida in apks.☆25Nov 2, 2023Updated 2 years ago
- Simple example of jadx plugin☆27Mar 23, 2026Updated last month
- Wrapper to inject an Objection/Frida gadget into an APK, with support for app bundles/split APKs.☆24Apr 28, 2026Updated 3 weeks ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 13 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- ☆29Jun 20, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- encrypted-linux-kernel-modules☆13Nov 4, 2020Updated 5 years ago
- The NowSecure Mobile Security Report☆11Nov 16, 2016Updated 9 years ago
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- A graphical user interface for Magic Wormhole file transfer☆13May 17, 2022Updated 4 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 10 years ago
- ☆31Jan 30, 2021Updated 5 years ago