riboseinc / retraceView external linksLinks
retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on Linux, OpenBSD/FreeBSD/NetBSD (shared object) and macOS (dynamic library).
☆61Feb 14, 2022Updated 4 years ago
Alternatives and similar repositories for retrace
Users that are interested in retrace are comparing it to the libraries listed below
Sorting:
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Universal firewall configuration generator.☆19Jan 24, 2019Updated 7 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- ☆21May 20, 2016Updated 9 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Jan 4, 2017Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 2 months ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 7 months ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago