Scapy hands-on
ā36Nov 16, 2023Updated 2 years ago
Alternatives and similar repositories for scapy-handson
Users that are interested in scapy-handson are comparing it to the libraries listed below
Sorting:
- Activate Windows & Office šā13Jun 15, 2024Updated last year
- Open-source implementations of reference Physical True Random Number Generators (TRNG or PTRNG) based on ring oscillators.ā15Oct 15, 2025Updated 4 months ago
- ā12Apr 27, 2024Updated last year
- ā14Jun 26, 2013Updated 12 years ago
- ā11Feb 23, 2025Updated last year
- My attempt to access x86 hardware without interference from modern OS, just like the old days :)ā19Jul 4, 2022Updated 3 years ago
- Hooking Heavens Gate in a weekendā13Jan 1, 2022Updated 4 years ago
- Moovbox Mismanagement Utilitiesā15Mar 21, 2015Updated 10 years ago
- my writeups (mainly pwnable)ā35Sep 22, 2024Updated last year
- IOPMP IPā22Jul 11, 2025Updated 7 months ago
- My solutions to RPISEC's Modern Binary Exploitation course labā14Mar 9, 2018Updated 7 years ago
- Windows 8.x HAL extensionsā23Sep 14, 2024Updated last year
- š§ A simple kernel-level rootkitā21Mar 1, 2016Updated 10 years ago
- Docker kinsing malware bitcoin/xmr minerā23Feb 18, 2021Updated 5 years ago
- Yet, Another Packer/Loaderā25Feb 26, 2023Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)ā22Mar 26, 2023Updated 2 years ago
- Commandline utility to interact with the Malpedia serviceā22Dec 5, 2025Updated 3 months ago
- Shared library injection for *nix using ptrace, in Rust.ā24Aug 13, 2024Updated last year
- Same code , different CPU case , different build case , Iot bins reverse learning.ā28Mar 8, 2017Updated 8 years ago
- A training platform with different Scenarios of CTF Web Challengesā27Apr 11, 2021Updated 4 years ago
- ā35Jan 27, 2025Updated last year
- Configurations for DFIR ORCā28Mar 28, 2024Updated last year
- Find IP address and Geolocation of target whatsapp userā11Nov 23, 2023Updated 2 years ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.ā84Aug 13, 2024Updated last year
- Example implementations of PEP 578 and 551 entry pointsā35May 12, 2025Updated 9 months ago
- Volatility memory forensics plugin for extracting Windows DNS Cacheā29Mar 13, 2017Updated 8 years ago
- CS2 internal cheat (Aimbot + ESP) written C++ for Windows.ā35Jul 10, 2024Updated last year
- SIM Card tunnel for Alcatel OT-918Dā38Sep 29, 2014Updated 11 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signaturesā38Sep 22, 2024Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLsā36Jan 12, 2022Updated 4 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structureā37Jul 8, 2024Updated last year
- Import DynamoRIO drcov code coverage data into Ghidraā44Dec 21, 2023Updated 2 years ago
- ā28Feb 13, 2017Updated 9 years ago
- VirusTotal Intelligence Searchā40May 21, 2020Updated 5 years ago
- Undetected DLL Injection Methodā35May 26, 2023Updated 2 years ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the Pā¦ā47Jan 28, 2023Updated 3 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.ā91Nov 8, 2025Updated 3 months ago
- Detection Engineering with YARAā87Jan 6, 2024Updated 2 years ago
- Malware similarity platform with modularity in mind.ā80Jul 18, 2021Updated 4 years ago