dennwc / protodView external linksLinks
Protobuf file descriptor extractor
☆23Jun 15, 2019Updated 6 years ago
Alternatives and similar repositories for protod
Users that are interested in protod are comparing it to the libraries listed below
Sorting:
- go-bssid-geolocator☆14Mar 19, 2025Updated 10 months ago
- ☆10Sep 1, 2021Updated 4 years ago
- Python decompiler. Written in JavaScript. Works in NodeJS. Decompiles extremely fast.☆19Dec 26, 2025Updated last month
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Some CTF Write-ups☆26Feb 7, 2022Updated 4 years ago
- The container escape challenge of Be A RWCTFer competition (https://be-a-rwctfer.realworldctf.com/)☆61Mar 20, 2025Updated 10 months ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- QueryFuzz implements a metamorphic testing approach to test Datalog engines.☆36Jun 8, 2021Updated 4 years ago
- Linux Process Injection via Seccomp Notifier☆81Dec 9, 2025Updated 2 months ago
- A simple, reliable and reasonably fast network capture analyzer.☆24Feb 7, 2026Updated last week
- A Xbox One/Series Flash Dumper for SystemOS created in C#.☆44Mar 29, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- ☆40Feb 3, 2026Updated last week
- ☆46Nov 13, 2021Updated 4 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Windows command line utility to set Intel FIVR voltage offset.☆13Mar 7, 2021Updated 4 years ago
- A plugin for Binary Ninja to query the Symgrate2 database.☆13Sep 11, 2021Updated 4 years ago
- IDA Pro plugin to recovery static Thumb2 symbols.☆12Sep 14, 2021Updated 4 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆27Nov 10, 2025Updated 3 months ago
- ☆11Nov 25, 2020Updated 5 years ago
- 在线安软识别☆12Aug 6, 2025Updated 6 months ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Rust implementation of the Hyperion Ambient Lighting software☆12Updated this week
- A small tool to patch PE files' import address table with an external payload DLL.☆14Feb 7, 2026Updated last week
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 10 months ago
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆11Apr 14, 2017Updated 8 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆15Sep 2, 2024Updated last year
- Modify ELF executables☆16Mar 5, 2019Updated 6 years ago
- ☆10Oct 1, 2024Updated last year