dulaku / alsannaView external linksLinks
A CLI-based intercepting TLS proxy for TCP
☆19Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for alsanna
Users that are interested in alsanna are comparing it to the libraries listed below
Sorting:
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Mar 9, 2025Updated 11 months ago
- ☆11Nov 17, 2017Updated 8 years ago
- Trace any method in any assembly in any (live) .NET process!☆11Mar 3, 2016Updated 9 years ago
- CMSIS-DAP debug probe based on STM32F042☆10May 19, 2019Updated 6 years ago
- ☆11Jun 25, 2020Updated 5 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆11Apr 14, 2017Updated 8 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆33Feb 27, 2025Updated 11 months ago
- ☆20Feb 22, 2021Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- ☆11Jan 11, 2025Updated last year
- A command-line tool to tidy-up Objective-C interfaces generated with class dump tools.☆12Feb 23, 2017Updated 8 years ago
- ☆46Nov 14, 2020Updated 5 years ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆53Apr 4, 2020Updated 5 years ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Collection of reusable references☆14Jan 1, 2026Updated last month
- (NO LONGER MAINTAINED) Clone of RTAI from https://www.rtai.org☆28Jan 11, 2016Updated 10 years ago
- Token impersonation in PowerShell to execute under the context of another user.☆23Oct 14, 2025Updated 4 months ago
- uShell example☆10Oct 3, 2021Updated 4 years ago
- No description yet☆11May 26, 2023Updated 2 years ago
- CH55x USB demo and Host controller app☆12Aug 19, 2020Updated 5 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆14Feb 27, 2024Updated last year
- Reverse engineering of WEB-PDC001 protocol☆13May 19, 2019Updated 6 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Moved to HappyHackingSpace/pirebok☆14Updated this week
- A C# port of the MinHook API hooking library☆56Oct 5, 2022Updated 3 years ago
- CH551 Programming software☆13May 16, 2024Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- ☆17Aug 31, 2023Updated 2 years ago
- ☆14Sep 2, 2020Updated 5 years ago
- slightly-revived and hacked fork of the old noah (NOvel Archicture Hypervisor?) project for using linux vendor tools on macos☆19May 9, 2022Updated 3 years ago
- Z Camera E2 firmware reverse-engineering results.☆16Oct 8, 2023Updated 2 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆13Dec 9, 2018Updated 7 years ago