☆23Apr 10, 2016Updated 9 years ago
Alternatives and similar repositories for peda_cheatsheet
Users that are interested in peda_cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15May 6, 2021Updated 4 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- ☆17May 10, 2021Updated 4 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- Linux File System☆15Jan 22, 2014Updated 12 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- a friendly implementation of nyx ontop of firecracker instead of QEMU. Easier to use & cleaner code☆31Jan 20, 2026Updated 2 months ago
- Rust bindings for googleprojectzero/TinyInst☆25Dec 3, 2025Updated 3 months ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Oct 31, 2022Updated 3 years ago
- ☆11Oct 18, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- Console command lines, security tools and some useful macros to automate this repository's tools. (MacOs, Linux, Windows)☆21May 7, 2024Updated last year
- Python tools for webscraping at pydata conference☆16Apr 8, 2016Updated 9 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- A native macOS GUI wrapper built on top of searchsploit CLI.☆15Mar 18, 2018Updated 8 years ago
- CTF writeups from GatorSheavesMutably (https://ctftime.org/team/109518) and More Smoked Leet Chicken (https://ctftime.org/team/1005)☆30Dec 9, 2025Updated 3 months ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆15Nov 25, 2021Updated 4 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- Burp Suite extension to help make Graphql request more readable☆32Dec 7, 2017Updated 8 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- A client API for OWASP ZAP that uses Java types.☆20Mar 17, 2023Updated 3 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 10 years ago
- A quick-and-easy web CTF platform for people who love ASCII and minimalism.☆14Jun 20, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A minimal Java client for the Nessus XML RPC interface☆23Apr 1, 2017Updated 8 years ago
- Piping Server written in Go language (original: https://github.com/nwtgck/piping-server)☆29Nov 21, 2025Updated 4 months ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- A deflate compressor that emits compressed data that is in the [A-Za-z0-9] ASCII byte range.☆39Jan 25, 2022Updated 4 years ago