blog
☆14Jan 1, 2020Updated 6 years ago
Alternatives and similar repositories for Blog
Users that are interested in Blog are comparing it to the libraries listed below
Sorting:
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Jun 17, 2016Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- ☆17Sep 3, 2018Updated 7 years ago
- Simple commit search utility for Chromium Google Source.☆29Dec 8, 2022Updated 3 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- fuzz☆125Jul 18, 2015Updated 10 years ago
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- IDA Pro MSDN Helper☆39Sep 5, 2016Updated 9 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Aug 5, 2015Updated 10 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- 实验室工作实录,一个二导☆33Dec 18, 2022Updated 3 years ago
- Machine Learning for Cyber Security☆27Sep 1, 2017Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Nov 1, 2018Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Python to analyse bitcoin blockchain, chainstate, blockindex, mempool etc☆10Jun 18, 2019Updated 6 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- PHP生产MySQL数据库字典☆10Apr 27, 2016Updated 9 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- hctf2015 all problems and writeups from authors☆78May 17, 2022Updated 3 years ago