hughpearse / gisele
Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols
☆14Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for gisele
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆12Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆22Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Some yara rules and tools☆16Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- ☆26Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆37Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- Run a windows process with many inputs and catch exit codes☆14Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- Yara Plugin for Binary Ninja☆12Updated 6 years ago