corkami / miscLinks
scripts, etc...
☆37Updated last year
Alternatives and similar repositories for misc
Users that are interested in misc are comparing it to the libraries listed below
Sorting:
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Binary reversing tool to find all possible code paths between two functions.☆27Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 6 years ago
- VM setup for Malware RE labs☆28Updated 6 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 9 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Basic file metadata gathering script☆21Updated 5 months ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆90Updated 7 years ago
- [F]aster [U]niversal [U]npacker☆56Updated 12 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago
- ☆65Updated 8 years ago
- Cryptographic Dataset Generation & Modelling Framework☆38Updated 5 years ago
- simple shellcode generator☆114Updated 8 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago