corkami / miscLinks
scripts, etc...
☆37Updated last year
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- VM setup for Malware RE labs☆28Updated 6 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Miscellaneous analysis tools☆25Updated 10 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- All related files and slides for past talks☆44Updated last month
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- ☆21Updated 6 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- ☆36Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- hax 'n shit☆121Updated 10 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- ☆63Updated 9 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- Windows Software Exploitation☆136Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Updated 12 years ago
- Google Chrome internals analysis using Volatility☆41Updated 3 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- [F]aster [U]niversal [U]npacker☆60Updated 12 years ago