merces / examineLinks
A command line Swiss army knife for string and number conversions
☆18Updated 5 years ago
Alternatives and similar repositories for examine
Users that are interested in examine are comparing it to the libraries listed below
Sorting:
- A set of functions to increase productivity while hacking with Bash☆204Updated 2 months ago
- Fast, simple and portable hexadecimal/ASCII dumper☆68Updated 2 years ago
- cuz life is scriptable...☆26Updated 9 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 8 years ago
- Kurgan AI - Web Application Security Analyzer☆26Updated 7 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- ☆19Updated 10 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- This is just a repository of a developer noob.☆17Updated 7 years ago
- laboratório sobre buffer overflows☆15Updated 8 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Updated 12 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 7 months ago
- PoC || GTFO Issues☆70Updated 5 years ago
- ☆10Updated 2 years ago
- Pwn2Win CTF 2017☆27Updated 7 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 6 years ago
- An Open Source Malware Analysis Pipeline System☆158Updated 4 years ago
- Platform Test Edition☆17Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 4 months ago
- SPLITTER is TOR based load balance approach create to difficult correlation, traffic analysis and statistical attacks inside TOR network.☆134Updated 2 years ago
- Ferramenta de Reconhecimento para Pentest☆46Updated 4 years ago
- H2HC Magazine☆118Updated 5 months ago
- Man in the middle automated attacks☆21Updated 9 years ago
- Wordlists based on Brazilian passwords and dictionaries.☆172Updated 9 years ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆273Updated 8 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 4 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago