mentebinaria / curso-ghidra
Repositório do Curso de Ghidra
☆19Updated 3 years ago
Related projects: ⓘ
- A simple multiplatform command line search tool for Windows API.☆42Updated last year
- Livro: Engenharia Reversa - Fundamentos e Prática☆165Updated 2 months ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆14Updated 2 years ago
- a cpp wrapper for ngrok☆8Updated 3 years ago
- Multiplatform CLI and GUI tool to show information about ELF files☆49Updated last year
- Exploit development challenges!☆24Updated last year
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆29Updated 3 years ago
- H2HC Magazine☆101Updated last month
- Capture newly created files on Windows☆61Updated 2 years ago
- ☆11Updated this week
- ☆18Updated this week
- Organização das palestras - Evento Aratu | Boitatech☆38Updated 2 years ago
- BIOS Workshop 2023☆24Updated 10 months ago
- Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)☆8Updated 2 years ago
- CLI program to calculate the entropy of files☆64Updated 9 months ago
- As the name maProc informs, it will map processes in linux, being able to check a process's stack/heap in User Land, being able to change…☆23Updated last year
- ☆16Updated this week
- Tool to start a python http server in a simple way☆10Updated 2 years ago
- ☆18Updated this week
- ELT write-ups repository.☆41Updated last year
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆9Updated 6 months ago
- Simple and pratical security gate for Github Security Alerts☆15Updated this week
- ☆12Updated this week
- Versão PT-BR do hacktricks.☆46Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.☆11Updated 3 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆12Updated last year
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆36Updated 6 months ago
- Open malware analysis / reversing database☆11Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆95Updated last year