☆22Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for real_hacker_hours
Users that are interested in real_hacker_hours are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 20, 2021Updated 5 years ago
- A simple command line utility to quickly load and unload Windows drivers☆19Jul 2, 2022Updated 3 years ago
- ☆110Dec 30, 2019Updated 6 years ago
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Jun 19, 2020Updated 5 years ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated 3 months ago
- ☆133May 3, 2024Updated 2 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- ☆14May 16, 2024Updated last year
- Pure Rust implementation of LZ4 compression and decompression as a library☆17Jun 9, 2020Updated 5 years ago
- Small program to run requests against a web server and look for problems☆11Jan 20, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆30Jul 18, 2025Updated 9 months ago
- ☆21Feb 20, 2014Updated 12 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Stuff that should be imprinted in the mind☆34May 16, 2010Updated 15 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- A simple 'This day in history' API written in Python, that pulls data from wikipedia☆17May 22, 2025Updated 11 months ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆36Sep 3, 2021Updated 4 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This repository contains HPC application best practices, specifically designed and optimized to run on AWS.☆20Updated this week
- OpenSearch custom lucene codecs for providing different on-disk index encoding (e.g., compression).☆14Apr 28, 2026Updated last week
- A Binary Ninja plugin for demangling Rust symbols.☆14Jul 9, 2023Updated 2 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- Gave a talk on Vectorized emulation at Recon Montreal 2019, here are the slides☆18Jun 28, 2019Updated 6 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 4 years ago
- A wireshark dissector addon for the Modbus umas Shneider protocol☆20Dec 19, 2022Updated 3 years ago
- InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts!☆16May 31, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- ☆16May 12, 2025Updated 11 months ago
- [ARCHIVED] Dask support for multi-GPU machine learning algorithms --> Moved to cuml☆16Jul 30, 2019Updated 6 years ago
- ☆17Jan 23, 2024Updated 2 years ago
- Path bookmarking for bash. I use this extensively throughout my day.☆24Apr 22, 2020Updated 6 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- ☆16Feb 27, 2026Updated 2 months ago