☆35Jan 27, 2025Updated last year
Alternatives and similar repositories for webinars
Users that are interested in webinars are comparing it to the libraries listed below
Sorting:
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- This repo hosts an MCP server for volatility3.x☆39Jul 9, 2025Updated 7 months ago
- Binary Only Thread Sanitizer☆18Aug 10, 2024Updated last year
- ☆14Feb 7, 2018Updated 8 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Frida plugin for Binary Ninja☆20Jan 12, 2025Updated last year
- Write-ups for crackmes and CTF challenges☆53Nov 24, 2022Updated 3 years ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆47Jan 28, 2023Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- ☆19Jul 21, 2025Updated 7 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Nov 13, 2025Updated 3 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year
- ☆18Dec 9, 2023Updated 2 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- ☆127Updated this week
- ☆79Jul 26, 2022Updated 3 years ago
- Discover DYLD_INSERT_LIBRARIES hijacks on macOS☆45Sep 15, 2022Updated 3 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 10 months ago
- ☆22Feb 18, 2025Updated last year
- ☆18Mar 26, 2024Updated last year