Papers about known hacking, security, hardware, software, computer, network and other ressources.
☆79Sep 29, 2019Updated 6 years ago
Alternatives and similar repositories for papers
Users that are interested in papers are comparing it to the libraries listed below
Sorting:
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Public Nullsecurity Website☆14Jan 2, 2026Updated 2 months ago
- this is a complete guide if you want to become in a black hat hacker but remember this is illegal☆15May 30, 2024Updated last year
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- A FreeBSD kernel rootkit.☆15Apr 14, 2020Updated 5 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Hardware Trojan on a Basis 3 FPGA for Hardware and Embedded Systems Security☆11May 1, 2017Updated 8 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- The official BlackArch Linux installer☆128Mar 29, 2025Updated 11 months ago
- ☆12Jun 13, 2016Updated 9 years ago
- EVILSPLOIT – A UNIVERSAL HARDWARE HACKING TOOLKIT☆96Mar 27, 2018Updated 7 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- BlackArch Linux Guide for Users and Developers☆176Aug 3, 2025Updated 7 months ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- ☆11Aug 9, 2016Updated 9 years ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- 一次通过 DNS 来实现部分区域 XSS 防护的简单尝试。☆11Sep 26, 2016Updated 9 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- A custom coprocessor and SoC for hardware security experiments in electronics.☆12May 20, 2017Updated 8 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago