A CLI-based intercepting TLS proxy for TCP
☆19Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for alsanna
Users that are interested in alsanna are comparing it to the libraries listed below
Sorting:
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Mar 9, 2025Updated 11 months ago
- ☆11Nov 17, 2017Updated 8 years ago
- CMSIS-DAP debug probe based on STM32F042☆10May 19, 2019Updated 6 years ago
- Trace any method in any assembly in any (live) .NET process!☆11Mar 3, 2016Updated 10 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- ☆11Feb 23, 2026Updated last week
- ☆20Feb 22, 2021Updated 5 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆35Feb 27, 2025Updated last year
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- A command-line tool to tidy-up Objective-C interfaces generated with class dump tools.☆12Feb 23, 2017Updated 9 years ago
- ☆11Jun 25, 2020Updated 5 years ago
- ☆46Nov 14, 2020Updated 5 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 2 months ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 4 months ago
- Reverse engineering of WEB-PDC001 protocol☆13May 19, 2019Updated 6 years ago
- ☆12Dec 15, 2019Updated 6 years ago
- Property based testing plugin for unexpected.☆12Jun 1, 2025Updated 9 months ago
- uShell example☆10Oct 3, 2021Updated 4 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- Moved to HappyHackingSpace/pirebok☆14Feb 11, 2026Updated 3 weeks ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- CH55x USB demo and Host controller app☆12Aug 19, 2020Updated 5 years ago
- No description yet☆11May 26, 2023Updated 2 years ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆54Apr 4, 2020Updated 5 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- Simple boot splash for Linux☆18Mar 15, 2024Updated last year
- ☆14Sep 2, 2020Updated 5 years ago
- Detect AES and RSA keys in a memory dump.☆14Jul 28, 2016Updated 9 years ago
- ☆17Oct 25, 2021Updated 4 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- phonetonote alpha☆13Jan 31, 2026Updated last month
- Z Camera E2 firmware reverse-engineering results.☆17Oct 8, 2023Updated 2 years ago
- Quick & dirty static HTTP2 server☆15May 27, 2020Updated 5 years ago
- Command line client for 1Password that supports opvault vault format☆10Feb 5, 2019Updated 7 years ago