☆11Nov 27, 2021Updated 4 years ago
Alternatives and similar repositories for pe-necro
Users that are interested in pe-necro are comparing it to the libraries listed below
Sorting:
- ☆24May 26, 2021Updated 4 years ago
- PoC for CVE-2020-11896 Treck TCP/IP stack and device asset investigation☆10Sep 3, 2020Updated 5 years ago
- Python module wrapping Bindiff usage into a Python API.☆22Jan 20, 2026Updated last month
- Protect domains from malicious browser extensions☆17Apr 16, 2025Updated 10 months ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Fuzzing with the generated argument☆33Jan 6, 2023Updated 3 years ago
- ☆39May 11, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- CVE-2023-40477 PoC by Wild-Pointer☆24Aug 30, 2023Updated 2 years ago
- Automatic updater plugin for x64dbg☆24Jul 5, 2025Updated 8 months ago
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆102Jan 13, 2023Updated 3 years ago
- ☆27Apr 27, 2022Updated 3 years ago
- Have you ever wondered: what if IDA had great Ctrl+F search support for Pseudocode windows? No longer!☆73Jan 10, 2026Updated last month
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- poc code for CVE-2024-38080☆30Sep 1, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- ☆82Aug 30, 2024Updated last year
- Stuff that should be imprinted in the mind☆34May 16, 2010Updated 15 years ago
- Slides from Off-By-One Conferences☆33Sep 9, 2024Updated last year
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- 試試你的好手氣☆41Jan 26, 2026Updated last month
- ☆46Sep 22, 2025Updated 5 months ago
- MinIO敏感信息泄露漏洞批量扫描poc&exp☆36Mar 24, 2023Updated 2 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Jul 30, 2022Updated 3 years ago
- Cryfind is a tool to help you find crypto signatures in binary.☆36Oct 19, 2021Updated 4 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Fuzzing with the generated argument and environment variable☆10Jul 14, 2022Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆116Apr 15, 2022Updated 3 years ago
- Sarif exporter☆13Apr 23, 2024Updated last year
- Aura client☆12Feb 2, 2017Updated 9 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Simple docker container for compiling rust applications with target mipsel-openwrt-linux-musl with openssl support☆14Jun 28, 2019Updated 6 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year