fail0verflow / thud
thud - the bouncer that doesn't
☆24Updated 12 years ago
Alternatives and similar repositories for thud:
Users that are interested in thud are comparing it to the libraries listed below
- Radeon reverse engineering tools☆149Updated 4 years ago
- Dan Kaminsky's clock drift entropy generator☆6Updated 10 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- [Deprecated] Runs 64-bit Elf files in-process on Linux, FreeBSD and the PS4☆28Updated 8 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- Packet-o-matic NG !☆64Updated 5 months ago
- Fernvale research OS☆25Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- An overlay that verifies signed ELF binaries☆9Updated 9 years ago
- Small and cheap standalone USB sanitizer☆42Updated 3 years ago
- ☆13Updated 5 years ago
- An IRC client fuzzer written in Python 3☆16Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- A program to send Ethernet PAUSE frames☆35Updated 8 years ago
- ☆13Updated 7 years ago
- Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified …☆23Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Quickly retrieve all keys and download links of your bundle from IndieGala or Humble Bundle. This is not a hack or anything like that to …☆10Updated 5 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Safely print shared library dependencies (similar to ldd)☆23Updated last year
- Stuff that I created while doing my GSM-security research☆22Updated 11 years ago