lawndoc / jaws
Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blog post
☆235Updated 2 years ago
Alternatives and similar repositories for jaws:
Users that are interested in jaws are comparing it to the libraries listed below
- Stash for Binary Exploitation and Reverse Engineering Resources☆101Updated 4 years ago
- Hash identification program.☆151Updated 3 years ago
- DC540 hacking challenge 0x00001.☆26Updated last year
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- A tool to extract useful data from documents☆155Updated 2 months ago
- Tartarus | STEGANOGRAPHY☆59Updated 3 years ago
- A targeted DNS cache poisoner☆117Updated 2 years ago
- ☆229Updated last year
- ☆88Updated 4 years ago
- Binary Golf Examples and Resources☆252Updated 7 months ago
- Security Research☆40Updated 2 years ago
- Automated Recon Script for Hackthebox machines (hackthebox.eu)☆54Updated 4 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆186Updated 2 years ago
- A curated reading list about offensive IT security☆139Updated 5 months ago
- Self-replicating, self-modifying Assembly program that can evolve into every possible computer program in the universe (EXPERIMENTAL)☆57Updated 4 years ago
- ☆167Updated last year
- ☆38Updated 3 months ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- 0xpat blog☆100Updated 3 years ago
- Small example repo for looking into log4j CVE-2021-44228☆69Updated 3 years ago
- ☆565Updated last week
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆455Updated 2 years ago
- Integrated web scraper and email account data breach comparison tool☆78Updated 6 months ago
- Binary Golf Grand Prix☆111Updated last year
- Running Hashcat on Google Colab with session backup and restore.☆727Updated 3 years ago
- A polyglot payload generator☆239Updated 2 years ago
- Software Reverse Engineering with Ghidra, published by Packt☆147Updated 2 years ago
- A collection of pwn/CTF related utilities for Ghidra☆665Updated 5 months ago
- A pure Python script to easily get a reverse shell☆51Updated 2 years ago
- Code snippets for bare-metal malware development☆97Updated 3 years ago