loyza0 / agentLinks
☆10Updated 5 years ago
Alternatives and similar repositories for agent
Users that are interested in agent are comparing it to the libraries listed below
Sorting:
- Expired FUD .exe crypter☆10Updated 5 years ago
- Information for students about front-end development class on CULS☆10Updated 9 years ago
- python library to manage and reduce lattices☆23Updated 8 years ago
- Very simple runtime hooking library for OS X.☆15Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Updated 5 years ago
- A collection of more than 1000 binary libc files☆87Updated 10 years ago
- ctf writeups☆19Updated 6 years ago
- A toolset for extending closed-source Linux processes☆10Updated 9 years ago
- Proof of Work generator☆12Updated 5 years ago
- TDOH Conf 2016 演講相關資料☆30Updated 8 years ago
- ☆2Updated last year
- Old NVIDIA CUDA implementation of salted MD5 brute-force☆17Updated 9 years ago
- Fork from http://redmine.poppopret.org/projects/suterusu. An LKM rootkit targeting Linux 2.6/3.x on x86 and ARM. Supports privilege esca…☆33Updated 12 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆11Updated 7 years ago
- ☆21Updated 8 years ago
- CTF write-ups by VXRL 🇭🇰☆9Updated 7 years ago
- code to reverse vxworks 5.x password hashes☆17Updated 8 years ago
- a modular malware framework written in golang☆11Updated 6 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆141Updated 6 years ago
- Write ups☆16Updated 7 years ago
- An iOS app to control a toy car through bluetooth and gyroscope.☆7Updated 10 years ago
- CDDC Exploitation Framework☆13Updated last year
- Code to fuzz bignum libraries☆45Updated 6 years ago
- WarCraft FrozenThrone 1.26.0.6401☆4Updated 9 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- a exploit for cve-2016-0728☆7Updated 9 years ago
- ☆26Updated 7 years ago
- Work-in-progress Dissent port/rewrite for low-latency anonymous communication☆11Updated 6 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago