mattetti / IOLI-crackmeLinks
crackme exercises with instructions to learn in a safe environment
☆15Updated 7 years ago
Alternatives and similar repositories for IOLI-crackme
Users that are interested in IOLI-crackme are comparing it to the libraries listed below
Sorting:
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Some ELF Malwares☆10Updated 3 years ago
- ☆20Updated 11 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆25Updated last week
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Updated 11 years ago
- ☆70Updated 7 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Updated 4 years ago
- ☆17Updated 7 years ago
- Advanced threat detection solution for Linux.☆36Updated 5 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 7 years ago
- Decrypt encrypted SonicOSX firmware images☆20Updated 11 months ago
- ASUS wifi router RCE vulnerability☆18Updated 3 months ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Sample code for DNS spoofing with ARP poisoning.☆21Updated 10 years ago
- ☆12Updated 6 years ago
- ☆14Updated 6 years ago
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆35Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 8 months ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ☆21Updated 5 years ago
- ☆54Updated 5 years ago
- Prometheus-Decryptor is a project to decrypt files encrypted by Prometheus ransomware.☆53Updated 4 years ago
- ☆24Updated 4 years ago
- Various exploits☆10Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Various Crypter Project☆10Updated 11 years ago