nttcom / gharfView external linksLinks
GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD
☆35Jul 14, 2025Updated 7 months ago
Alternatives and similar repositories for gharf
Users that are interested in gharf are comparing it to the libraries listed below
Sorting:
- Automatically identify and extract potential anti-debugging techniques used by malware.☆27Nov 20, 2024Updated last year
- ☆33Nov 10, 2025Updated 3 months ago
- Ecommerce Store is a Java-based web application built using Spring Boot MVC and Thymeleaf for creating a fully functional online shopping…☆13Jan 24, 2025Updated last year
- Extract compressed memory pages from page-aligned data☆47Sep 25, 2018Updated 7 years ago
- ☆15Jul 22, 2025Updated 6 months ago
- ☆11Jun 13, 2025Updated 8 months ago
- MCP Server for Cutter☆21Aug 2, 2025Updated 6 months ago
- Linux内核学习——心中的内核☆19Jun 24, 2025Updated 7 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- KTRR bypass for iPhone 7 (10.0 - 10.1.1) - http://yalu.qwertyoruiop.com/y7.txt☆11Mar 17, 2018Updated 7 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 6 years ago
- Elish?/Enuma | 4.19.y | CLO + ACK | Docker?☆14Updated this week
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆14Jul 10, 2025Updated 7 months ago
- For mobile phone game to get FPS: frame per second.☆10Feb 10, 2015Updated 11 years ago
- Tools once available from McAfee but are no longer☆13May 9, 2024Updated last year
- 🐧 Ucanto UCAN RPC in Go☆13Dec 11, 2025Updated 2 months ago
- Education software to provide VMs and networks as-a-service.☆14Jan 31, 2026Updated last week
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Image Annotations tools integrated with sam 3☆22Feb 6, 2026Updated last week
- Unoffical template for Unisa thesis☆13Apr 14, 2020Updated 5 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Prometheus-Decryptor is a project to decrypt files encrypted by Prometheus ransomware.☆53Aug 18, 2021Updated 4 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Jun 22, 2018Updated 7 years ago
- GuardianCTF 2018 Writeups Repository☆12Apr 13, 2019Updated 6 years ago
- ☆17Nov 7, 2025Updated 3 months ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Hollow Knight: Silksong Cheat Mod | 空洞骑士:丝之歌 修改器模组☆18Oct 1, 2025Updated 4 months ago
- Dependency of Realme 5 Series (5/5s/5i/5Nfc) (r5x)☆12Feb 4, 2026Updated last week
- Forum notification service for Wikidot☆14Nov 27, 2025Updated 2 months ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 7 months ago
- ☆10Jul 16, 2023Updated 2 years ago
- 2018年度のbootcampのセキュリティ教材☆13Apr 27, 2018Updated 7 years ago
- ☆16Jul 19, 2024Updated last year
- CVE List Found by Team Code4Block☆12Dec 19, 2022Updated 3 years ago
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing☆22Jun 30, 2025Updated 7 months ago
- An eBPF-powered intrusion detection system with an end-to-end pipeline for kernel event monitoring, analysis, and visualization☆20Aug 13, 2025Updated 6 months ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Hacking on ESR's ctopy the C to Python conversion tool: http://www.catb.org/~esr/ctopy/☆14May 20, 2012Updated 13 years ago