retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on Linux, OpenBSD/FreeBSD/NetBSD (shared object) and macOS (dynamic library).
☆60Feb 14, 2022Updated 4 years ago
Alternatives and similar repositories for retrace
Users that are interested in retrace are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Cryptode macOS Menu App☆19Oct 21, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆11Aug 19, 2017Updated 8 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Universal firewall configuration generator.☆19Jan 24, 2019Updated 7 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- Embedding Ruby in the Apache web server☆31Oct 29, 2013Updated 12 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- ☆12Aug 1, 2025Updated 8 months ago
- Scripts that I've written that others may find useful☆13Aug 17, 2022Updated 3 years ago
- jQuery Autocomplete plugin☆96Aug 4, 2011Updated 14 years ago
- Decrypt encrypted SonicOSX firmware images☆19Feb 24, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Scripts and parsers to facilitate data visualization with various tools.☆21May 3, 2015Updated 10 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Jan 4, 2017Updated 9 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- ECS "scheduler" that places services on each node in the cluster.☆11Oct 29, 2017Updated 8 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 4 months ago
- ☆21Jan 12, 2012Updated 14 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Twilio log viewer / dashboard replacement. Faster than the Twilio API☆11Mar 21, 2024Updated 2 years ago
- Low cost USB RF transceiver☆11Feb 14, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 8 years ago
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆81Dec 24, 2017Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago