scrapped ideas and garbage code
☆13May 8, 2021Updated 4 years ago
Alternatives and similar repositories for asdf
Users that are interested in asdf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Aug 8, 2019Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆11Oct 13, 2020Updated 5 years ago
- Find strings in Go binaries☆55Sep 16, 2019Updated 6 years ago
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Dec 21, 2020Updated 5 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- Code and data of the CCS '22 paper titled "Understanding Security Issues in the NFT Ecosystem"☆11Dec 20, 2022Updated 3 years ago
- llvm crash analysis☆44Jun 26, 2024Updated last year
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- A Node.js wrapper for the GovTrack data API☆19Jan 1, 2015Updated 11 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- ☆11Oct 3, 2024Updated last year
- ☆28Dec 7, 2016Updated 9 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- strace2seccomp - generates libseccomp policies from strace logs☆10Feb 19, 2020Updated 6 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆63Feb 24, 2026Updated last month
- ☆53Jun 13, 2019Updated 6 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Code for SIGKDD'2021 paper: Deep Clustering based Fair Outlier Detection☆11Oct 15, 2021Updated 4 years ago
- VM setup for Malware RE labs☆28Apr 26, 2019Updated 6 years ago
- Repo for CSAW CTF 2018 Finals challenges☆54Nov 17, 2018Updated 7 years ago
- Forest of random partitioning trees for point-wise and collective anomaly detection☆12Nov 1, 2024Updated last year
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Download or Live Stream from Hotstar☆12Aug 12, 2017Updated 8 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Documentation and notes on using the Hiew editor.☆18Mar 22, 2022Updated 4 years ago
- ssh code☆12May 8, 2017Updated 8 years ago