☆228May 24, 2023Updated 2 years ago
Alternatives and similar repositories for protocols
Users that are interested in protocols are comparing it to the libraries listed below
Sorting:
- Binary Golf Examples and Resources☆260Oct 24, 2025Updated 4 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- Binary Golf Library☆61May 1, 2021Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Binary Golf Grand Prix☆116Oct 31, 2023Updated 2 years ago
- Binary Protocol Differ☆117Jun 26, 2020Updated 5 years ago
- The xx file format. Turn your hex dumps into art, then into binary data.☆348Jun 12, 2023Updated 2 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- An auto-configuring reverse DNS name server☆11Nov 2, 2025Updated 4 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Useful books, links, blogs, etc.☆14Jan 29, 2018Updated 8 years ago
- yxd - Yuu's heX Dumper☆92Jun 26, 2024Updated last year
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- ☆27Apr 25, 2023Updated 2 years ago
- quality of life☆19Dec 24, 2019Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76May 22, 2020Updated 5 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Phrack Crackme Challenges☆21Apr 24, 2025Updated 10 months ago
- ☆669Mar 25, 2025Updated 11 months ago
- Injects additional machine instructions into various binary formats.☆289Feb 3, 2024Updated 2 years ago
- A multi-arch assembly REPL and emulator for your command line.☆312Dec 7, 2024Updated last year
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 3 years ago
- random dissectors☆68Apr 29, 2023Updated 2 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆38Dec 16, 2024Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Apr 8, 2020Updated 5 years ago
- Attack Surface Management since before Attack Surface Management was a thing☆657Feb 23, 2026Updated last week
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago