d1str0 / dc29-badgeView external linksLinks
☆73Aug 9, 2021Updated 4 years ago
Alternatives and similar repositories for dc29-badge
Users that are interested in dc29-badge are comparing it to the libraries listed below
Sorting:
- Do funny things with your DEF CON 29 badge.☆16Aug 20, 2021Updated 4 years ago
- As the name says. Forges badge responses for the Defcon 29 badge and allows folks to jump straight to having completed the signal.☆16Aug 6, 2021Updated 4 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- ☆10Jul 24, 2020Updated 5 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A fuzzer setup to fuzz libc functions.☆16Aug 30, 2022Updated 3 years ago
- EDK II☆16Apr 30, 2024Updated last year
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- Windows 64-bits driver☆17Dec 1, 2017Updated 8 years ago
- DC27 MULTI PASS Badge☆17Sep 6, 2019Updated 6 years ago
- Writeup for the DEF CON 30 badge challenge☆72Aug 23, 2022Updated 3 years ago
- Virtual Machine Introspection (VMI) for memory forensics and machine-learning.☆27Jun 2, 2025Updated 8 months ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Dec 13, 2020Updated 5 years ago
- Robust API monitoring system presented in the paper "Designing Robust API Monitoring Solutions" (IEEE TDSC)☆24Dec 8, 2021Updated 4 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆31Oct 10, 2019Updated 6 years ago
- Docker Crash Course: How to containerize your favorite security tools☆28Jun 20, 2023Updated 2 years ago
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆38Jun 26, 2025Updated 7 months ago
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Apr 21, 2023Updated 2 years ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆35Sep 4, 2023Updated 2 years ago
- Open source for K2 Series Klipper☆29Dec 12, 2025Updated 2 months ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆75Jul 25, 2025Updated 6 months ago
- Terrain Mesh Generator implemented in C/C++ using ImGui and OpenGL libraries.☆18Apr 7, 2025Updated 10 months ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- UEFI UEFI UEFI☆47Apr 21, 2023Updated 2 years ago
- ☆20Jul 14, 2025Updated 6 months ago
- A feature-complete reference implementation of a modern Xen VMI debugger. ARCHIVED: Development continues at https://github.com/spencermi…☆78Nov 2, 2020Updated 5 years ago
- A Raspberry Pi based Nintendo Zone access point.☆11Apr 24, 2016Updated 9 years ago
- https://github.com/sagishahar/lpeworkshop☆10Sep 19, 2020Updated 5 years ago
- ☆10Jan 24, 2021Updated 5 years ago
- CMSC389R course at UMD☆10Oct 2, 2019Updated 6 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- docker-microtsocks☆11Sep 7, 2023Updated 2 years ago
- Python module for parsing and writing MagicaVoxel vox files using numpy☆11Oct 20, 2021Updated 4 years ago
- python exploit for werkzeug debug shell command execution☆10Jun 26, 2017Updated 8 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- Linux kernel source tree patched with Hypervisor-Enforced Kernel Integrity☆13Nov 14, 2023Updated 2 years ago
- PowerShell script to create SCCM environment.☆11Jul 6, 2021Updated 4 years ago