corkami / miscLinks
scripts, etc...
☆37Updated last year
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
 - [F]aster [U]niversal [U]npacker☆57Updated 12 years ago
 - Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
 - Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
 - The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
 - unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
 - Miscellaneous analysis tools☆26Updated 10 years ago
 - VM setup for Malware RE labs☆28Updated 6 years ago
 - Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
 - Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
 - Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
 - Misc PoCs for various research topics☆21Updated 3 years ago
 - unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
 - A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
 - Tool to help guess a files 256 byte XOR key by using frequency analysis☆90Updated 7 years ago
 - Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
 - An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
 - Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 8 years ago
 - A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
 - Automatically exported from code.google.com/p/malware-lu☆56Updated 6 years ago
 - x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
 - ☆36Updated 6 years ago
 - LPE exploits for Secret Net and Secret Net Studio☆51Updated 9 years ago
 - Google Chrome internals analysis using Volatility☆42Updated 2 years ago
 - ☆44Updated 5 years ago
 - Binary reversing tool to find all possible code paths between two functions.☆27Updated 7 years ago
 - Personal repository for all ctf related stuffs☆67Updated 11 months ago
 - A GUI-based USB device fuzzer☆64Updated 8 years ago
 - CANAPE Network Testing Tool☆34Updated 7 years ago
 - a collection of yara rules for binary analysis☆24Updated 8 years ago