☆13Apr 30, 2016Updated 9 years ago
Alternatives and similar repositories for bsidesaustin
Users that are interested in bsidesaustin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Common dependency management for various Trail of Bits C++ codebases☆35Jun 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Oct 23, 2015Updated 10 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆19Oct 18, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 13 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Alienvault Labs Projects Random Stuff☆79Sep 24, 2013Updated 12 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Your bag of handy codes for malware researchers☆120Mar 20, 2020Updated 6 years ago
- ☆14May 16, 2024Updated last year
- Looks up command line syntax from cheatsheets using fuzzy search☆16Apr 10, 2026Updated last week
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- A place holder for Keystone repo. See https://github.com/keystone-engine/keystone for the real stuff☆67Apr 8, 2022Updated 4 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Oct 1, 2018Updated 7 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆12Mar 3, 2016Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Small script to assemble/disassemble from CLI☆23Aug 15, 2022Updated 3 years ago
- metamorphic engine in python☆34Sep 8, 2016Updated 9 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- A cryptographically secure lockless PRNG device driver using AES☆10Aug 15, 2021Updated 4 years ago
- ☆18Aug 31, 2014Updated 11 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago