🎯 Vulnerability Pryer - Prying context into your vulnerability data
☆21Feb 24, 2026Updated last month
Alternatives and similar repositories for VulnPryer
Users that are interested in VulnPryer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of private keys that are flawed for research purposes.☆12Sep 11, 2020Updated 5 years ago
- A copy of the Attrition.org web page hack / defacement mirror. Details: https://attrition.org/mirror/☆21Mar 18, 2026Updated last week
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Auditing & Hardening script for Kubernetes☆45Apr 12, 2018Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24May 10, 2025Updated 10 months ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Nerve is a cross platform hit tracer built on Ragweed☆47Dec 6, 2011Updated 14 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Scans iPhone/iPad/iPod applications for PIE flags☆32Mar 4, 2012Updated 14 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- UbiGraph Server is a system for visualizing dynamic graphs☆12May 10, 2018Updated 7 years ago
- This is a simple example of how to run the android ADK feature on a basic Arduino Uno with USB Host Shield.☆14May 24, 2011Updated 14 years ago
- PyDBG64 - OS X PyDbg with 64 bits support☆73Mar 12, 2012Updated 14 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Ansible galaxy role for Duo☆14Nov 30, 2015Updated 10 years ago
- A fuzzing library that allows creating malicious payloads based on Joi validator schemas.☆14Apr 20, 2015Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Python SSDeep wrapper☆14Aug 27, 2018Updated 7 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 9 years ago