lawndoc / jawsLinks
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog post
☆234Updated 6 months ago
Alternatives and similar repositories for jaws
Users that are interested in jaws are comparing it to the libraries listed below
Sorting:
- Hash identification program.☆154Updated 3 years ago
- A targeted DNS cache poisoner☆123Updated 3 years ago
- ☆230Updated 2 years ago
- ☆86Updated 5 years ago
- Tartarus | STEGANOGRAPHY☆59Updated 4 years ago
- A collection of (relatively) harmless prank examples using the Windows API☆503Updated 3 years ago
- Binary Golf Examples and Resources☆256Updated last year
- ☆48Updated 6 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,196Updated 5 months ago
- Proof of concept for pwnkit vulnerability☆344Updated 2 years ago
- A curated reading list about offensive IT security☆144Updated 3 weeks ago
- Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆42Updated last year
- 0xpat blog☆104Updated 3 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆106Updated 5 years ago
- Windows x64 handcrafted token stealing kernel-mode shellcode☆509Updated last year
- A tool to extract useful data from documents☆155Updated 10 months ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 4 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆248Updated 3 months ago
- ☆168Updated last year
- Security Research☆39Updated 3 years ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆385Updated 4 years ago
- A fun repository on how to externally issue commands to Roku devices utilizing the External Control Protocol (ECP). The repository covers…☆289Updated last year
- Binary Golf Grand Prix☆113Updated last year
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- DC540 hacking challenge 0x00001.☆26Updated last year
- a CTF web challenge about making screenshots☆224Updated 4 years ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆394Updated 5 years ago
- C Compiler which targets Excel (MS Office)☆288Updated 5 years ago
- An easy but powerful hack of the standard copy-paste behaviour of any browser☆61Updated 3 years ago
- ☆45Updated 4 years ago