lcatro / my-blogView external linksLinks
我的技术博客,记录成长
☆25Jan 30, 2019Updated 7 years ago
Alternatives and similar repositories for my-blog
Users that are interested in my-blog are comparing it to the libraries listed below
Sorting:
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- SecistSploit☆17Dec 6, 2018Updated 7 years ago
- 一个轻量级、多线程、支持管道的自动化互联网漏洞挖掘框架。☆21Oct 30, 2018Updated 7 years ago
- xinetd-kafel is a more secure replacement for xinetd with secure computing (seccomp, only work on linux)☆18Jun 9, 2018Updated 7 years ago
- Offline Security Focus Database☆31Dec 24, 2012Updated 13 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- CVE-2019-14540 Exploit☆21Aug 21, 2019Updated 6 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- ☆21May 1, 2019Updated 6 years ago
- Python3 driver for Wappalyzer, a web application detection utility.☆19Aug 18, 2017Updated 8 years ago
- OpenSource My ImageMagick Fuzzer ..☆298Jul 26, 2017Updated 8 years ago
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables☆104Mar 25, 2021Updated 4 years ago
- ☆26Apr 24, 2019Updated 6 years ago
- JBoss JMXInvokerServlet JMXInvoker 0.3 - Remote Command Execution 漏洞批量检测☆67Dec 6, 2015Updated 10 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- All architecture and all version of gdbserver.☆31Sep 23, 2022Updated 3 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- a AWVS12 api tool☆119Aug 30, 2020Updated 5 years ago
- RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)☆133Jan 19, 2023Updated 3 years ago
- A collection of reverse-engineered documentation for the instruction sets for various generations of Mali GPU's.☆38Mar 10, 2018Updated 7 years ago
- 子域名后续的信息收集工具☆29Apr 9, 2020Updated 5 years ago
- ☆37May 11, 2022Updated 3 years ago
- 从二进制到WEB ,分享我在安全路上的思考与点滴,后面会不断地更新..☆83Dec 22, 2017Updated 8 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- C# .NET Attribute based command line argument parser☆13Dec 28, 2011Updated 14 years ago
- 🔑 WinPass11 WinService is a tool for loading keys into the registry on startup with the use of Windows Services.☆13Jun 29, 2021Updated 4 years ago
- ☆10Jul 23, 2019Updated 6 years ago
- Probing HTTP services☆10Oct 14, 2024Updated last year
- 《智能投顾》读书笔记☆12May 23, 2019Updated 6 years ago
- Forcefully stops the services related to Windows 10 background updates.☆10Jul 18, 2018Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- Crypto coin mixer☆10Feb 14, 2018Updated 8 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Tool for extract NPK archives from game - LifeAfter☆12Sep 25, 2021Updated 4 years ago