soen-vanned / forced-evolutionLinks
forced-evolution
☆31Updated 12 years ago
Alternatives and similar repositories for forced-evolution
Users that are interested in forced-evolution are comparing it to the libraries listed below
Sorting:
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- ☆44Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 4 years ago
- Scalable Binary Data Extraction in Hadoop☆144Updated 11 years ago
- Exploits and research stuffs☆55Updated last month
- ☆74Updated 3 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- ☆27Updated 8 years ago
- Configuration security audit framework☆21Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- ☆111Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- A weekly challenge where we share some code and you find a bug in it.☆71Updated 10 years ago
- ☆50Updated 9 years ago
- ☆51Updated 8 years ago
- Security tools to use on assessments.☆40Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- GDB commands to aid exploit development☆46Updated 9 years ago