Sourcecode created during my Livestream (English)
☆112May 13, 2020Updated 5 years ago
Alternatives and similar repositories for stream-en
Users that are interested in stream-en are comparing it to the libraries listed below
Sorting:
- Gynvael's Livestream code☆137Aug 11, 2023Updated 2 years ago
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆52Mar 9, 2024Updated last year
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w …☆30Nov 12, 2019Updated 6 years ago
- ☆72Jul 8, 2021Updated 4 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- 'SWEETMON2' is a fuzzer monitoring service based Python3 + Django2. User can manage their fuzzers and crashes on the web. It can reduce r…☆10Jun 5, 2020Updated 5 years ago
- A study on the automation of unpacking API wrapping in Themida☆12May 3, 2018Updated 7 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- Interface GDB-GEF with Binary Ninja☆58Mar 27, 2021Updated 4 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Simplified Assembly Loader - a small tool to run (headerless) machine code.☆45Apr 16, 2017Updated 8 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- ☆50Dec 17, 2020Updated 5 years ago
- ☆32Jan 24, 2016Updated 10 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- ☆34Dec 3, 2016Updated 9 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago