☆16Jun 4, 2019Updated 6 years ago
Alternatives and similar repositories for xori-og
Users that are interested in xori-og are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated last year
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- access zap proxy api using ruby☆12Mar 2, 2018Updated 8 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Mar 2, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Blazefox exploits for Windows 10 RS5 64-bit.☆151Dec 9, 2019Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Script to chain search parameters for MalwareBazaar☆13Jan 26, 2025Updated last year
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- crabstone is a Ruby binding to the capstone disassembly library by Nguyen Anh Quynh☆19Aug 4, 2024Updated last year
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Containerlab topologies for routing software interoperability tests.☆21Dec 6, 2025Updated 3 months ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆31Mar 22, 2023Updated 3 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- 整理容器逃逸相关的漏洞和exploits.☆15Apr 17, 2024Updated last year
- Use a local instance of retdec to decompile functions in radare2☆22Dec 3, 2021Updated 4 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ☆12Mar 28, 2022Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago