corkami / miscLinks
scripts, etc...
☆37Updated last year
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- VM setup for Malware RE labs☆28Updated 6 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 5 years ago
- All related files and slides for past talks☆44Updated last week
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Updated 7 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- [F]aster [U]niversal [U]npacker☆59Updated 12 years ago
- Google Chrome internals analysis using Volatility☆41Updated 3 years ago
- Basic file metadata gathering script☆21Updated 8 months ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆55Updated 8 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- ☆65Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- hax 'n shit☆121Updated 10 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆36Updated 6 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- UEFI keylogger prototype☆10Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Plugins for the Viper Framework☆14Updated 6 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Updated 6 years ago