You can find a lot of libcrafter code right over here
☆54Dec 6, 2025Updated 4 months ago
Alternatives and similar repositories for libcrafter-examples
Users that are interested in libcrafter-examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- A simple calculator using ragel and lemon☆18Apr 28, 2016Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Automated antivirus test environment☆44Jul 6, 2015Updated 10 years ago
- Moved to https://codeberg.org/DNS-OARC/omg-dns☆17Feb 4, 2026Updated 2 months ago
- Ipsumdump and other programs for command-line network trace manipulation.☆40Feb 16, 2024Updated 2 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- A collection of scripts based on libclang for extracting API information from interpreters☆25Jul 10, 2012Updated 13 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automatic ROP chain generator☆12Mar 29, 2015Updated 11 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- This repo will contain scripts, binaries which will speed up the kernel address extraction process☆20Dec 25, 2013Updated 12 years ago
- Eltima Port Virtualization Technology may be integrated to the software or hardware solutions to get the remote access to network devices☆11Jun 6, 2018Updated 7 years ago
- enable kmem without rebooting☆23May 6, 2012Updated 13 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Cockos Happy AVS v2.91 by Justin Frankel☆18Jan 18, 2014Updated 12 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Reverse AIDL tool☆45Apr 1, 2015Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Nerve is a cross platform hit tracer built on Ragweed☆47Dec 6, 2011Updated 14 years ago
- android kernel disassembler based on MAME emulator code☆39Nov 26, 2013Updated 12 years ago
- Mimicking grids in Android lists☆148Apr 15, 2015Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago