securisec / glorifiedgrepLinks
Static code search python lib
☆18Updated 4 years ago
Alternatives and similar repositories for glorifiedgrep
Users that are interested in glorifiedgrep are comparing it to the libraries listed below
Sorting:
- Break Apps with Frida workshop material☆42Updated 7 years ago
- python and honggfuzz☆25Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆13Updated 4 years ago
- ☆18Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated last year
- Presented hardware reverse engineering workshops since 2019☆61Updated 9 months ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆44Updated 7 years ago
- Telco training☆26Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 5 years ago
- Memory inspection REPL interface☆46Updated 7 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- Presentations☆11Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆25Updated 2 months ago
- The best way to learn Frida, is practicing. This is an example of scripts to use in a practical workshop.☆27Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ☆13Updated 6 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- A tool for auditing medical devices and healthcare infrastructure☆20Updated 2 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago