A CLI-based intercepting TLS proxy for TCP
☆19Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for alsanna
Users that are interested in alsanna are comparing it to the libraries listed below
Sorting:
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆53Mar 9, 2025Updated 11 months ago
- A Rust doubly-linked intrusive list with Miri tests☆12May 4, 2024Updated last year
- Blocking Windows EDR agents by registering an own IPC-object in the Object Manager’s namespace (CVE-2023-3280, CVE-2024-5909, CVE-2024-20…☆35Feb 27, 2025Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- ☆11Nov 17, 2017Updated 8 years ago
- CMSIS-DAP debug probe based on STM32F042☆10May 19, 2019Updated 6 years ago
- A command-line tool to tidy-up Objective-C interfaces generated with class dump tools.☆12Feb 23, 2017Updated 9 years ago
- Trace any method in any assembly in any (live) .NET process!☆11Mar 3, 2016Updated 10 years ago
- We are analyzing Youtube trends and comments to ultimately discover how youtubers become famous.☆10Dec 8, 2022Updated 3 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- ☆46Nov 14, 2020Updated 5 years ago
- An Arduino-like programming API for the CH55X☆12Jul 24, 2020Updated 5 years ago
- ☆11Jun 25, 2020Updated 5 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Tool for discovering and de-anonymizing Classic Bluetooth connections☆54Apr 4, 2020Updated 5 years ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- ☆12Dec 15, 2019Updated 6 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 2 months ago
- A Binary Ninja plugin for WebAssembly.☆15Jun 30, 2020Updated 5 years ago
- No description yet☆11May 26, 2023Updated 2 years ago
- Reverse engineering of WEB-PDC001 protocol☆13May 19, 2019Updated 6 years ago
- uShell example☆10Oct 3, 2021Updated 4 years ago
- CH55x USB demo and Host controller app☆12Aug 19, 2020Updated 5 years ago
- The Becoming Anonymous website, you are welcome to contribute!☆11Apr 13, 2018Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Token impersonation in PowerShell to execute under the context of another user.☆24Oct 14, 2025Updated 4 months ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A C# port of the MinHook API hooking library☆55Oct 5, 2022Updated 3 years ago
- Detect AES and RSA keys in a memory dump.☆14Jul 28, 2016Updated 9 years ago
- Stlink Bootloaders☆13Jun 30, 2020Updated 5 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆17Oct 25, 2021Updated 4 years ago