☆34Feb 9, 2018Updated 8 years ago
Alternatives and similar repositories for Valhalla-ezines
Users that are interested in Valhalla-ezines are comparing it to the libraries listed below
Sorting:
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- reconstruct z0mbie's homepage from 2005☆44Feb 17, 2022Updated 4 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- x86 and x64 assembly "read-eval-print loop" for Windows☆35Aug 13, 2017Updated 8 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- CryptoChecker with bunch of features. Seedphrase checker, Metamask, Brave, Ronin, Binance Chain, Exodus, Atomic wallets. NFT & Airdrops c…☆36May 15, 2025Updated 9 months ago
- Wow64 Heaven's Gate Hook☆29Jul 28, 2021Updated 4 years ago
- ☆50May 12, 2021Updated 4 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆51Jul 30, 2021Updated 4 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- "Hacks" for online blooket games. Does not require outside information (ie. url, gamepin, sign in information) blooket hacks☆13Jan 25, 2024Updated 2 years ago
- DNS server for pentesters☆50Nov 2, 2025Updated 4 months ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- Automatically exported from code.google.com/p/portable-executable-library☆24Jan 31, 2016Updated 10 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- A framework for exploiting padding oracles in network-based applications☆26Feb 25, 2023Updated 3 years ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- Finding code caves in ELF files with GoLang☆26Jan 15, 2018Updated 8 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 8 months ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆185Jan 21, 2024Updated 2 years ago
- Transforms any file into a protected ELF executable☆29Mar 17, 2015Updated 10 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Oct 7, 2020Updated 5 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- A simple Linux in-memory .so loader☆33Mar 29, 2023Updated 2 years ago
- ☆51Jun 28, 2025Updated 8 months ago
- Study and research with your docs, media, and AI in one place☆33Mar 2, 2026Updated last week
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Oct 12, 2018Updated 7 years ago
- demo☆12Dec 17, 2020Updated 5 years ago