dciets / Arcade-CS-GamesLinks
Jeux pour l'arcade des CS Games
☆21Updated 8 years ago
Alternatives and similar repositories for Arcade-CS-Games
Users that are interested in Arcade-CS-Games are comparing it to the libraries listed below
Sorting:
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 11 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A TE executable format loader for IDA☆28Updated 10 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 5 years ago
- ☆12Updated 9 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago
- Statically linked Library detector☆70Updated 11 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆82Updated 6 years ago
- ☆59Updated 11 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆48Updated 5 years ago
- american fuzzy lop fuzzer from lcamtuf☆14Updated 11 years ago
- Memory awesomeness.☆29Updated 10 years ago
- ☆30Updated 10 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 11 years ago
- Examples and demos for my LCA2015 radare2 reverse engineering tutorial☆24Updated 11 years ago
- Crypto scanner☆43Updated 14 years ago
- ssltrace hooks an application's SSL libraries to record keying data of all SSL connections☆95Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Files compiled from the Logica breach investigation materials☆45Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- Project for the Crypto subject at Uni☆18Updated 9 years ago
- ☆10Updated 10 years ago
- Automatic ROP chain generator☆12Updated 10 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago