PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and tailored specification of the rehosting process
☆54Apr 8, 2026Updated this week
Alternatives and similar repositories for penguin
Users that are interested in penguin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆56Nov 4, 2025Updated 5 months ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- Adds back the /scores JSON API for ctftime.org☆13Aug 22, 2023Updated 2 years ago
- DrayTek Vigor165 stuff☆12Oct 30, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 6 months ago
- Pushbullet notifications channel for Laravel☆14Jun 19, 2024Updated last year
- some kernel pwn practice questions.☆25Nov 25, 2024Updated last year
- This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.☆36Jan 22, 2021Updated 5 years ago
- Repository for (for now) filing bug reports about PLAI.☆15Jul 5, 2025Updated 9 months ago
- Resources to get started with EMFI, based on my HWIO USA 2023 talk☆26Jul 9, 2024Updated last year
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆18Dec 10, 2021Updated 4 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- A detailed guide to setting up a QEMU/KVM for gaming.☆12Nov 24, 2023Updated 2 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 5 months ago
- ☆22Aug 20, 2025Updated 7 months ago
- A Stack-Based programming language, using Hebrew Niqqud diacritical marks☆14Dec 7, 2022Updated 3 years ago
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 9 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- iOS: Make keyboard show current case.☆22Nov 15, 2014Updated 11 years ago
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆67Feb 16, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆97May 4, 2025Updated 11 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated 2 months ago
- Implementation of the NDSS'24 paper "SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing"☆20Sep 7, 2023Updated 2 years ago
- Patching framework for Xtensa based Qualcomm Wifi chips☆14Aug 7, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- use an LLM to translate purpose-statements into code to evaluate their quality☆11Apr 3, 2024Updated 2 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆39Sep 22, 2024Updated last year
- This is the source code for P2IM paper (accepted to Usenix Security'20)☆142Oct 14, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Ansible playbook to provide decent desktop experience☆14Mar 29, 2025Updated last year
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆24May 1, 2025Updated 11 months ago
- ☆37Sep 29, 2020Updated 5 years ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆57Updated this week
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Rizin Signature Database (Source)☆17Aug 23, 2023Updated 2 years ago
- Lecture notes, exercises, homeworks for Brown CS1951x 2023☆12Jan 31, 2024Updated 2 years ago