Hyperscan bindings for Rust with Multiple Pattern and Streaming Scan
☆21Oct 21, 2022Updated 3 years ago
Alternatives and similar repositories for rust-hyperscan
Users that are interested in rust-hyperscan are comparing it to the libraries listed below
Sorting:
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- Beef hook OWA / Outlook☆12Mar 27, 2019Updated 6 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Mar 30, 2025Updated 11 months ago
- ASUSWRT Source Code (RT-AC68U)☆12Oct 24, 2015Updated 10 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Yewoh (pronounced yew-oh) is an Ultima Online library & server emulator built with bevy.☆16Nov 14, 2024Updated last year
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Easy crash-reporting for Frida-based applications.☆18Aug 19, 2019Updated 6 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- 未授权批量检测脚本☆14Oct 9, 2019Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- phpweb 前台任意文件上传☆16Jan 9, 2020Updated 6 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆17Dec 4, 2018Updated 7 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 11 months ago
- ☆50May 12, 2021Updated 4 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- 黑苹果运行在Vmware虚拟机中☆18Oct 8, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- Our fork of Iceman's fork for Proxmark III☆18Dec 14, 2024Updated last year
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Basic Dart reverse shell code