Binary Golf Examples and Resources
☆261Oct 24, 2025Updated 6 months ago
Alternatives and similar repositories for golfclub
Users that are interested in golfclub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- Binary Golf Grand Prix☆115Oct 31, 2023Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76May 22, 2020Updated 6 years ago
- Binary Golf Grand Prix☆87Apr 6, 2026Updated last month
- ☆227May 24, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 6 years ago
- Binary Golf Library☆64May 1, 2021Updated 5 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆41May 22, 2024Updated 2 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- A malware analysis and classification tool.☆191Dec 3, 2021Updated 4 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 3 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- ☆689Mar 25, 2025Updated last year
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Elf binary infector written in Go.☆217Jan 11, 2025Updated last year
- Small Rust programs that do weird things☆30Feb 13, 2026Updated 3 months ago
- An educational Bochs-based snapshot fuzzer project☆244Oct 27, 2025Updated 6 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆161Sep 3, 2022Updated 3 years ago
- ☆48Jul 7, 2020Updated 5 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆454Jan 26, 2026Updated 3 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Mar 21, 2023Updated 3 years ago
- yxd - Yuu's heX Dumper☆93Jun 26, 2024Updated last year
- ☆450Oct 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PoCs for Kernelmode rootkit techniques research.☆439Mar 25, 2026Updated last month
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated last year
- Interface GDB-GEF with Binary Ninja☆58Mar 27, 2021Updated 5 years ago
- Linux Sleep Obfuscation☆117Jan 7, 2024Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Exploring RPC interfaces on Windows☆352Jan 30, 2024Updated 2 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆28May 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PageBuster - dump all executable pages of packed processes.☆206Mar 31, 2021Updated 5 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆131Aug 11, 2023Updated 2 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆134Jan 26, 2026Updated 3 months ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- Operating System Design Review: A systematic analysis of modern systems architecture☆342Jan 11, 2026Updated 4 months ago
- A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory☆224May 28, 2022Updated 3 years ago