This repository is deprecated. See 02h.shawnd.xyz instead.
☆16Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for zero-to-hero-hacking
Users that are interested in zero-to-hero-hacking are comparing it to the libraries listed below
Sorting:
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- mirror of☆11Apr 4, 2018Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- A set of simple tools every developer needs, collected in one application.☆15May 9, 2019Updated 6 years ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 3 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A small, clean and simple theme for Godot 3+☆16Dec 2, 2018Updated 7 years ago
- Scanner for Intranet☆21Aug 15, 2021Updated 4 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- Started on 30-7-2020 (7/30/2020)☆11Oct 29, 2022Updated 3 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- ☆20Jan 10, 2021Updated 5 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆12Jul 21, 2019Updated 6 years ago
- Using the Windows API to mess with Task Manager in GoLANG☆15Sep 7, 2021Updated 4 years ago
- example flutter app with Appwrite backend☆16May 28, 2020Updated 5 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago
- Stack Based buffer overflow attack☆20Nov 25, 2023Updated 2 years ago
- Archlinux repository server & package build system, written in V (mirror)☆11Jul 17, 2023Updated 2 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Build, release and deploy Flutter apps☆11Dec 14, 2025Updated 3 months ago
- Assert that a change you expected to happen, happened, with this chai plugin☆14May 22, 2017Updated 8 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- /j f t/ - YAML file tool☆13Feb 9, 2026Updated last month
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Jul 2, 2021Updated 4 years ago
- 🍒 Dynamically inline assets into the DOM using Fetch Injection. Mirror of Fetch Inject on Codeberg.☆13May 26, 2024Updated last year
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆22Apr 18, 2020Updated 5 years ago
- ☆10Aug 12, 2022Updated 3 years ago
- Command line tool to run JavaScript, TypeScript or HTML files in the browser.☆12Updated this week
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago