pythontoday / brute_excelView external linksLinks
☆19Mar 21, 2021Updated 4 years ago
Alternatives and similar repositories for brute_excel
Users that are interested in brute_excel are comparing it to the libraries listed below
Sorting:
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- ☆12Nov 21, 2022Updated 3 years ago
- eBPF Tools - Tool for monitoring, performance benchmarking and tracing linux kernel☆16Jan 29, 2021Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Boosting Natural Language Generation from Instructions with Meta-Learning☆11Dec 20, 2022Updated 3 years ago
- An express middleware module for CAS authentication with Single Sign On Universitas Indonesia (SSO-UI)☆12Feb 6, 2019Updated 7 years ago
- GDB that can debug Mach-Os on Linux☆15Aug 11, 2017Updated 8 years ago
- ☆13Jan 11, 2023Updated 3 years ago
- interactive hex file viewer☆14Jan 30, 2021Updated 5 years ago
- A python tool that reads Python 2.x source code and applies a series of fixers to transform it into valid Python 3.x code ***that work on…☆10Feb 28, 2023Updated 2 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- Objective-C Hacking library used for making Mac game trainers.☆14Sep 22, 2017Updated 8 years ago
- Tunnel scanner☆19Mar 2, 2018Updated 7 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Python 3 bridge to IDA's Python environment☆17Aug 27, 2020Updated 5 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- Public Repo for the source code of the UDCTF in 2022☆12Nov 7, 2022Updated 3 years ago
- PHP dengan sintaks berbahasa Indonesia☆14Dec 10, 2017Updated 8 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- IDA Debugger Module to Dynamically Synchronize Memory and Registers with third-party Backends (Tenet, Unicorn, GDB, etc.)☆17Nov 10, 2021Updated 4 years ago
- An Android application, designed as a reference point, that implements an array of tamper and root detection methods - inspired by Google…☆15Jul 21, 2020Updated 5 years ago
- Aplikasi Tampol Online☆13Dec 1, 2019Updated 6 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Mar 8, 2022Updated 3 years ago
- Kumpulan writeup dari lomba lomba CTF dan juga soalnya (kalau ada)☆13May 2, 2023Updated 2 years ago
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- Standalone module for parsing binary and ASCII STL files, written in TypeScript☆17Jul 12, 2023Updated 2 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago