☆20Sep 8, 2019Updated 6 years ago
Alternatives and similar repositories for reversing_slides
Users that are interested in reversing_slides are comparing it to the libraries listed below
Sorting:
- ☆16May 6, 2015Updated 10 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆24Oct 3, 2021Updated 4 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Review everyday☆14May 30, 2020Updated 5 years ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- Python Data Audit☆12Jul 24, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- A Simple Backdoor For Apache HTTP Server☆156Aug 28, 2024Updated last year
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- Mitigate CVE-2018-6389 WordPress load-scripts / load-styles attacks☆13Aug 30, 2018Updated 7 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- A React Blog Powered by the Cosmic JS GraphQL API☆10Jan 22, 2018Updated 8 years ago
- ☆11Jul 16, 2018Updated 7 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- slide☆13Oct 26, 2017Updated 8 years ago
- ☆12May 22, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- A simple AV demo in iOS using facial recognition and the laughing man logo.☆21Feb 7, 2012Updated 14 years ago
- 《安全档案》信息安全技术期刊☆11Mar 30, 2019Updated 6 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- 🎥 A list of awesome engineering streams! ARCHIVED in favor of https://github.com/bnb/awesome-developer-streams☆10Dec 24, 2019Updated 6 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- ☆11Apr 2, 2022Updated 3 years ago
- ICNet in TensorFlow, Real-Time Segmentation☆10Aug 17, 2018Updated 7 years ago