darkspik3 / Valhalla-ezinesView external linksLinks
☆34Feb 9, 2018Updated 8 years ago
Alternatives and similar repositories for Valhalla-ezines
Users that are interested in Valhalla-ezines are comparing it to the libraries listed below
Sorting:
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- reconstruct z0mbie's homepage from 2005☆44Feb 17, 2022Updated 3 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Updated this week
- ☆10Jan 17, 2022Updated 4 years ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Oct 30, 2019Updated 6 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆35May 15, 2025Updated 9 months ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- Wow64 Heaven's Gate Hook☆29Jul 28, 2021Updated 4 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆50Jul 30, 2021Updated 4 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆14Jan 25, 2024Updated 2 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 3 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆55Feb 18, 2020Updated 5 years ago
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- Automatically exported from code.google.com/p/portable-executable-library☆24Jan 31, 2016Updated 10 years ago
- A framework for exploiting padding oracles in network-based applications☆26Feb 25, 2023Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 8 months ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆185Jan 21, 2024Updated 2 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- Transforms any file into a protected ELF executable☆29Mar 17, 2015Updated 10 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- SpinSight Roulette AI Is a powerful machine-learning model trained on thousands of hours of Roulette gameplay, analyzes real-time ball tr…☆16Jul 1, 2025Updated 7 months ago
- Rethinking the User Interface of AI☆28Updated this week
- ☆51Jun 28, 2025Updated 7 months ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Nov 2, 2022Updated 3 years ago