merces / examineLinks
A command line Swiss army knife for string and number conversions
☆18Updated 5 years ago
Alternatives and similar repositories for examine
Users that are interested in examine are comparing it to the libraries listed below
Sorting:
- Fast, simple and portable hexadecimal/ASCII dumper☆68Updated 2 years ago
- A set of functions to increase productivity while hacking with Bash☆203Updated last month
- My old lectures material about C and ASM☆6Updated 8 years ago
- cuz life is scriptable...☆26Updated 9 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 8 years ago
- Kurgan AI - Web Application Security Analyzer☆26Updated 7 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- ☆19Updated 10 years ago
- laboratório sobre buffer overflows☆15Updated 8 years ago
- This is just a repository of a developer noob.☆17Updated 7 years ago
- Pwn2Win CTF 2017☆27Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Updated 5 months ago
- ☆10Updated 2 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 6 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 3 months ago
- Platform Test Edition☆17Updated 7 years ago
- An Open Source Malware Analysis Pipeline System☆157Updated 4 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Updated 12 years ago
- Ferramenta de Reconhecimento para Pentest☆46Updated 4 years ago
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- ☆41Updated 6 years ago
- Man in the middle automated attacks☆21Updated 9 years ago
- PoC || GTFO Issues☆70Updated 5 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- Capture newly created files on Windows☆66Updated 3 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- articles of hacking, programming, privacy, activism☆22Updated 6 years ago
- Wordlists based on Brazilian passwords and dictionaries.☆170Updated 9 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago