Organise and access data collected during internal network pentests
☆10Jun 4, 2020Updated 5 years ago
Alternatives and similar repositories for binder
Users that are interested in binder are comparing it to the libraries listed below
Sorting:
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- ☆19Jan 8, 2026Updated 2 months ago
- Downgrade HTTP authentication on the network to capture clear-text credentials from clients☆19Nov 7, 2023Updated 2 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- Use LD_PRELOAD to redirect socket ports or unix domain socket paths☆13Sep 29, 2020Updated 5 years ago
- SSL certificate cloner☆14Jan 25, 2018Updated 8 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- ☆22May 12, 2025Updated 10 months ago
- uhf-rfid reader based on two TI1101 modules and an Arduino Due☆21Oct 17, 2022Updated 3 years ago
- An unsecure by-design PWA that students can analyse with a suite of tools and support to build their understanding of web-based secure so…☆10Oct 16, 2025Updated 5 months ago
- A guide on how to debug an Electron app.☆12Jan 29, 2017Updated 9 years ago
- PowerShell based network attached device monitor☆11Sep 3, 2024Updated last year
- hacking tools awesome lists☆16Jul 26, 2017Updated 8 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- VM for OSINT investigators that is a test-bed for using AI tools and agents to improve investigations. No out-of-date and unmaintained t…☆17May 2, 2025Updated 10 months ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- IRC bot to manage scrum-like standup meetings☆43Jul 30, 2019Updated 6 years ago
- Toy project for static analysis of ELF binaries☆29Jun 24, 2017Updated 8 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- A script for brute forcing Roku TVs and installing applications remotely.☆12Mar 25, 2023Updated 2 years ago
- Research on the Gallagher / Cardax access control system☆67Jan 9, 2020Updated 6 years ago
- Tool to mass analyse potentially exposed Firebase databases on Android apps☆67Oct 15, 2019Updated 6 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgets☆10May 3, 2021Updated 4 years ago
- Simple intermediate representation language for learning and research.☆20Mar 27, 2020Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- JWT key confusion attack, i.e. re-sigining RS256 to HS256☆13May 4, 2022Updated 3 years ago
- Spring Boot Web with Hessian☆11Jul 2, 2014Updated 11 years ago
- CNNPRE: A CNN-Based Protocol Reverse Engineering Method☆10Jan 13, 2026Updated 2 months ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Debugging PyO3 with Visual Studio Code☆16Apr 5, 2025Updated 11 months ago
- slide☆13Oct 26, 2017Updated 8 years ago