gynvael / random-stuffLinks
Random tools, code snippets, etc. No guarantee that any of this stuff works.
☆52Updated last year
Alternatives and similar repositories for random-stuff
Users that are interested in random-stuff are comparing it to the libraries listed below
Sorting:
- wordlists for password cracking☆28Updated 3 years ago
- ☆16Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Still point in moving world.☆51Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- ☆34Updated 7 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆86Updated last year
- ☆40Updated this week
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- Scapy hands-on☆34Updated last year
- ☆24Updated last year
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 6 months ago
- Tools that trigger False Positive AV alerts☆50Updated 8 months ago
- A VS Code extension to preview XML nmap output☆44Updated 6 months ago
- ☆18Updated 5 years ago
- ☆45Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ☆36Updated 4 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- ☆11Updated 6 years ago