neoneo40 / lena_reversingView external linksLinks
lena reversing hangul. https://tuts4you.com/download.php?view.2876
☆108Sep 15, 2015Updated 10 years ago
Alternatives and similar repositories for lena_reversing
Users that are interested in lena_reversing are comparing it to the libraries listed below
Sorting:
- ☆13Sep 15, 2018Updated 7 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- CVE-2019-2525 / CVE-2019-2548☆11Sep 4, 2020Updated 5 years ago
- Official write-up for Speed Hack event at POC2017☆15Nov 11, 2017Updated 8 years ago
- A Vim syntax highlighting for YARA and YARA-X rules☆31Jan 1, 2026Updated last month
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- IDA script for vmprotect Windows Api address decoder☆54Jun 8, 2021Updated 4 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 9 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Android App for software security project. unisannio☆16Feb 20, 2017Updated 8 years ago
- A WASM CTF Challenge☆18May 30, 2019Updated 6 years ago
- ☆16May 14, 2022Updated 3 years ago
- ☆18Aug 19, 2021Updated 4 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 7 years ago
- ☆22Aug 28, 2023Updated 2 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- ☆50Mar 21, 2019Updated 6 years ago
- ☆18Nov 7, 2017Updated 8 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Jul 24, 2022Updated 3 years ago
- PDB Dumping Tool☆60Nov 7, 2022Updated 3 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- ctf exploit codes or writeups☆160Dec 9, 2024Updated last year
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- ☆22Apr 11, 2022Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Oct 24, 2024Updated last year
- ☆26Jun 3, 2016Updated 9 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Feb 12, 2023Updated 3 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆184Oct 5, 2020Updated 5 years ago