merces / examineLinks
A command line Swiss army knife for string and number conversions
☆18Updated 5 years ago
Alternatives and similar repositories for examine
Users that are interested in examine are comparing it to the libraries listed below
Sorting:
- A set of functions to increase productivity while hacking with Bash☆206Updated 6 months ago
- Fast, simple and portable hexadecimal/ASCII dumper☆67Updated 3 years ago
- cuz life is scriptable...☆26Updated 9 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 9 years ago
- laboratório sobre buffer overflows☆15Updated 8 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 5 years ago
- Kurgan AI - Web Application Security Analyzer☆26Updated 8 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆21Updated 13 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- ☆19Updated 11 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 11 months ago
- Pwn2Win CTF 2017☆27Updated 8 years ago
- This is just a repository of a developer noob.☆17Updated 7 years ago
- ☆11Updated last month
- An Open Source Malware Analysis Pipeline System☆157Updated 4 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 months ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 5 years ago
- ☆46Updated 6 years ago
- PoC || GTFO Issues☆70Updated 5 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 7 years ago
- Man in the middle automated attacks☆21Updated 10 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago
- STAN is a sTAtic aNalyser☆38Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Updated 3 years ago
- Ferramenta de Reconhecimento para Pentest☆48Updated 4 years ago
- ☆102Updated 6 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- ☆122Updated 7 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- SPLITTER is TOR based load balance approach create to difficult correlation, traffic analysis and statistical attacks inside TOR network.☆135Updated 2 years ago