sirmx100 / malware_feeder
Gathers current reported online malicious websites and grabs the content for offline analyzing
☆14Updated 5 years ago
Related projects: ⓘ
- A collection of crackmes☆39Updated 5 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 4 years ago
- Retro Game Engine inspired by the SNES-era☆24Updated 2 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 5 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 6 years ago
- Hacking Games in a Hacked Game☆29Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Launch radare2 like a boss from pwntools in tmux☆22Updated 5 years ago
- ld_preload userland rootkit☆33Updated 3 years ago
- ☆38Updated this week
- Misc PoCs for various research topics☆21Updated last year
- Mass decryptor for Eazfuscator.net Symbol Names Encryption☆9Updated 5 years ago
- Spectre exploit☆55Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 7 years ago
- bunch of random stuff☆21Updated 4 years ago
- RetDec Offline Decompiler☆44Updated 4 years ago
- Educational tools for Binary Ninja☆20Updated 6 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 6 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆43Updated 3 years ago
- Experiments on C/C++ Exploits☆22Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- ☆55Updated this week
- ☆14Updated this week
- Ghidra consonance and make it more ida-ish☆15Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A plugin that adds a popup window to Binary Ninja that explains in simple English what an assembly instruction does☆50Updated 3 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Architectural privilege escalation on x86☆57Updated 6 years ago
- Public resources NB shares☆18Updated 8 years ago
- ☆17Updated this week