iwalk-locksmithers-app / server
☆30Updated 5 years ago
Alternatives and similar repositories for server:
Users that are interested in server are comparing it to the libraries listed below
- Hypervisor created by me, for Intel's VT-x extension☆13Updated 4 years ago
- Rashi Plus Plus - the new Hebrew scripting language☆92Updated 3 years ago
- All my public vulnerabilities.☆13Updated 4 years ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Updated 4 years ago
- A virtualization-based endpoint security solution for Windows☆85Updated 3 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Updated 6 years ago
- ☆54Updated 5 months ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13Updated 5 years ago
- Ivrita is an open-source set of typographic tools for gender equality in Hebrew☆43Updated 3 years ago
- Simple charts of COVID-19 spread in Israel☆46Updated 4 years ago
- Israel's Ministry of Health's COVID-19 Exposure Prevention App☆510Updated 2 years ago
- ☆71Updated 3 years ago
- Security Research☆39Updated 2 years ago
- ☆11Updated 2 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆292Updated 2 years ago
- A research project about Windows notify routines.☆35Updated 4 years ago
- A script that will send the upcoming CTFs to given discord webhook☆21Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- CTF Bot for Discord☆6Updated 2 years ago
- ☆42Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆13Updated 2 years ago
- Sourcecode created during my Livestream (English)☆112Updated 4 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- ☆134Updated last month
- Examples of FSB exploitable binaries that can be used to practice FSB.☆34Updated 3 years ago
- my results for the exercises in the book "Practical Reverse Engineering" by Bruce Dang et al.☆110Updated 10 years ago
- Example pwnable challenge hosted with docker☆219Updated last year
- CTF write-ups / solution scripts☆23Updated 6 years ago