☆30Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for recent-files-exclusions
Users that are interested in recent-files-exclusions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Threat Hijacking Simple Implementation☆22Feb 24, 2025Updated last year
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Process Creation, Image Load and Thread Creation Notification☆12Sep 15, 2023Updated 2 years ago
- Android 各版本新特性及避坑指南☆14Jan 17, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A small utility to run raw code chunks in the executable memory area.☆16Feb 6, 2015Updated 11 years ago
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆14Jan 18, 2022Updated 4 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- API tool for hashes.com escrow☆12May 2, 2026Updated 2 weeks ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- ☆15Jul 20, 2020Updated 5 years ago
- cryptam document malware analysis tool☆13Jun 18, 2023Updated 2 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Disassembly Generation and Processing for JARV1S☆15Jul 15, 2025Updated 10 months ago
- ☆16Dec 20, 2021Updated 4 years ago
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 5 months ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Windows USB RTL2832U driver☆10May 26, 2024Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Mar 18, 2023Updated 3 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆30Jan 27, 2025Updated last year
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Simple C++ Reverse Shell☆12Nov 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Using a proxy d3d11 dll and function hooking to inject triangle drawing code into Skyrim☆13Jul 12, 2021Updated 4 years ago
- Windbg scripts☆20Mar 5, 2015Updated 11 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 10 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago