Exploit systems using older WinRAR without knowing their username (unlike other projects)
☆35Aug 17, 2025Updated 6 months ago
Alternatives and similar repositories for CVE-2025-8088-Multi-Document
Users that are interested in CVE-2025-8088-Multi-Document are comparing it to the libraries listed below
Sorting:
- CVE-2024-57727☆14Jan 17, 2025Updated last year
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- ☆48Nov 26, 2025Updated 3 months ago
- C programming☆17Oct 24, 2024Updated last year
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆15Oct 5, 2023Updated 2 years ago
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- This repository covers computer networking fundamentals and advanced concepts including the OSI model, TCP/IP protocols, IP addressing & …☆62Aug 8, 2025Updated 7 months ago
- ☆24Updated this week
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Rust Based PE & Shellcode Packer☆40Dec 28, 2025Updated 2 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- ☆12Dec 22, 2025Updated 2 months ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated 2 months ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆41Jan 31, 2026Updated last month
- An evil RMI server that can launch an arbitrary command. May be useful for CVE-2021-44228☆12Dec 12, 2021Updated 4 years ago
- Red Team AI Benchmark: Evaluating Uncensored LLMs for Offensive Security☆27Dec 25, 2025Updated 2 months ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- 设置指定应用抓包 Xposed 插件☆14May 20, 2022Updated 3 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated last year
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago