A brute-forcing delta robot
☆28Sep 17, 2014Updated 11 years ago
Alternatives and similar repositories for R2B2
Users that are interested in R2B2 are comparing it to the libraries listed below
Sorting:
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- USB HID for Penetration Testing☆13Apr 6, 2016Updated 9 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated last month
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill☆13Jun 6, 2022Updated 3 years ago
- I hate this iPad 2☆10Oct 13, 2013Updated 12 years ago
- Kernel Wi-Fi/Bluetooth driver for the Pixel 6, Pixel 6 Pro, Pixel 6a, Pixel 7, Pixel 7 Pro and Pixel Fold.☆17Sep 3, 2025Updated 6 months ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- An iOS 8 app locker☆11Feb 23, 2015Updated 11 years ago
- ☆11Jun 5, 2017Updated 8 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- A program used to communicate with iBoot / iBSS using the libusb-1.0 api.☆16Aug 15, 2010Updated 15 years ago
- Atmosphère is a work-in-progress customized firmware for the Nintendo Switch.☆11Jun 17, 2019Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- API Routing Gateway with micro-payment verification☆11Mar 31, 2021Updated 4 years ago
- [DEPRECATED] Locally-installed tools required by the DexPatcher Gradle v1 plugins☆13Mar 21, 2019Updated 7 years ago
- KaiOS Antivirus Source Code☆13Mar 27, 2019Updated 6 years ago
- Nvidia Jetson TK1 Android TV device tree.☆10Jun 6, 2016Updated 9 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- 🍻 Ubeer is a stupidly simple application to demonstrate the capabilities of GraphQL in Scala using Sangria and Akka HTTP☆13Aug 10, 2017Updated 8 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Sep 14, 2021Updated 4 years ago
- A remake of iRecovery based off the syringe library.☆27Apr 11, 2011Updated 14 years ago
- TWRP device tree for Galaxy S7 (Qualcomm)☆11Sep 9, 2016Updated 9 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆20Aug 10, 2025Updated 7 months ago
- ☆35Aug 29, 2012Updated 13 years ago