gynvael / random-stuffLinks
Random tools, code snippets, etc. No guarantee that any of this stuff works.
☆52Updated last year
Alternatives and similar repositories for random-stuff
Users that are interested in random-stuff are comparing it to the libraries listed below
Sorting:
- Still point in moving world.☆49Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- ☆33Updated 8 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- ☆18Updated 5 years ago
- SSD Challenges☆48Updated 3 years ago
- ☆34Updated 7 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)☆74Updated 3 months ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- ☆59Updated 4 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆92Updated 3 months ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆52Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Scapy hands-on☆35Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 3 weeks ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆212Updated 9 months ago
- An archive of descrypt hashes for common non-personal passwords☆41Updated 7 months ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 3 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆88Updated 4 years ago
- A git history of Windows filesystems☆77Updated 5 years ago