soen-vanned / forced-evolutionLinks
forced-evolution
☆31Updated 12 years ago
Alternatives and similar repositories for forced-evolution
Users that are interested in forced-evolution are comparing it to the libraries listed below
Sorting:
- Exploits, Fuzzers, Scripts etc☆35Updated last month
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago
- Scalable Binary Data Extraction in Hadoop☆144Updated 11 years ago
- ☆51Updated 8 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Updated 10 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Security tools to use on assessments.☆40Updated 9 years ago
- A regex based source code scanner.☆127Updated 8 years ago
- ☆44Updated 8 years ago
- Cryptowall Tooling & Information☆37Updated 9 years ago
- ☆74Updated 3 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Small tool for disassembling shellcode (using objdump)☆149Updated 3 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- ☆111Updated 8 years ago
- ☆27Updated 8 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Simple shellcode decoder using unicorn-engine☆100Updated 10 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- Configuration security audit framework☆21Updated 9 years ago
- ☆50Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago