☆15May 1, 2023Updated 2 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- ☆10Aug 29, 2018Updated 7 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- Material extra☆14Dec 6, 2017Updated 8 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Scapy hands-on☆36Nov 16, 2023Updated 2 years ago
- Igor Pro data analysis procedures☆15Sep 26, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Three hundred years ago, the Brazilian Space Agency discovered a rocky exoplanet only 38 light years from Earth. With a surface temperatu…☆10Feb 19, 2016Updated 10 years ago
- AMX NetLinx IP Socket Manager☆13May 2, 2017Updated 8 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- maxscript fun☆10Nov 22, 2019Updated 6 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆10May 4, 2019Updated 6 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- A verified permissioned centralized Blockchain for Isabelle/HOL☆11Feb 3, 2018Updated 8 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- ODIN console files, for remote control of PowerSDR☆13Aug 11, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- CTF Writeups☆39Sep 23, 2018Updated 7 years ago
- CTF write-ups☆100Sep 12, 2025Updated 5 months ago
- ooc operating system☆41May 24, 2021Updated 4 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆10Mar 14, 2018Updated 7 years ago
- Code for the older 1.0 series of Pacemaker☆12Jun 3, 2016Updated 9 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- A Mercury CSV library.☆13Feb 18, 2026Updated 2 weeks ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Opa port of the TodoMVC app☆24Mar 11, 2012Updated 13 years ago
- simulations in J☆13Dec 9, 2017Updated 8 years ago
- Simulating Knowledge Dynamics in Innovation Networks☆15Nov 4, 2023Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- The ZOT Bounded Model/Satisfiability Checker (previously hosted as zot.googlecode.com)☆10Jan 11, 2021Updated 5 years ago