Published Articles of the Past (trying to be as complete as possible)
☆15Jan 20, 2021Updated 5 years ago
Alternatives and similar repositories for Articles
Users that are interested in Articles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Patch Queue for Ext4☆13May 28, 2019Updated 6 years ago
- Mirror of Linus Torvald's Kernel Tree☆14Oct 30, 2025Updated 4 months ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- Some daily usage scripts☆13Jan 4, 2026Updated 2 months ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 8 months ago
- H2HC Magazine☆121Apr 15, 2025Updated 11 months ago
- H2HC 2016 Slides/Materials/Presentations☆28Dec 21, 2016Updated 9 years ago
- Python bindings to the Open Source License API☆21Apr 5, 2020Updated 5 years ago
- ☆10Jun 22, 2025Updated 9 months ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- A cross platform, leak free system handle wrapper☆19Oct 24, 2017Updated 8 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Sep 23, 2022Updated 3 years ago
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 8 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆13Sep 8, 2020Updated 5 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- Presentations in different conferences☆38Oct 17, 2019Updated 6 years ago
- Essa repositório armazena uma versão em markdown do OWASP WSTG para ser utilizada como uma referência rápida durante testes de invasão em…☆16Aug 11, 2023Updated 2 years ago
- Privacy-Preserving Dynamic Learning of Tor Network Traffic☆10Jun 15, 2021Updated 4 years ago
- Scripts used for mongodb maintenance☆23Jan 30, 2012Updated 14 years ago
- Scripts to build and test Linux kernels☆50Jul 18, 2025Updated 8 months ago
- Pauta e programação do canal no Youtube Unix Load On https://www.youtube.com/UnixLoadOn☆12Jan 8, 2026Updated 2 months ago
- Userspace tool to create ext4 encrypted directories.☆52Feb 15, 2017Updated 9 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- todo is a bash script for Linux that manages todo lists through the command line in an easy to use manner. Lists are stored in ~/.todo/Li…☆13Dec 6, 2017Updated 8 years ago
- Dataspec for SII☆10Jan 4, 2017Updated 9 years ago
- Terraform template for a FreeBSD poudriere build machine☆11Apr 1, 2018Updated 7 years ago
- Add lore links to emails in mutt☆11Feb 9, 2026Updated last month
- ☆16Sep 26, 2016Updated 9 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Implementation of a Whois Server with a redis backend☆15Oct 31, 2010Updated 15 years ago