solst-ice / hex.danceLinks
simple client-side in-browser binary analysis and hex dump
☆91Updated last year
Alternatives and similar repositories for hex.dance
Users that are interested in hex.dance are comparing it to the libraries listed below
Sorting:
- Converts an image to ASCII art☆168Updated 2 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆289Updated 6 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 9 months ago
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆86Updated 9 months ago
- Web based binary analysis☆89Updated last year
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆81Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Updated last year
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆193Updated 9 months ago
- Still point in moving world.☆49Updated 3 years ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- ☆51Updated 6 months ago
- Send data with sound☆725Updated 3 months ago
- ☆137Updated last year
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated last year
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆72Updated 3 months ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆67Updated last year
- Hides message with invisible Unicode characters☆95Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- This is a list of currently known hidden pages within NETGEAR routers, switches, and other networking equipment. Why hidden? Ask Netgear.☆18Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆271Updated last year
- JPG steganography tool☆63Updated last month
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 4 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 7 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated 2 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆54Updated last year
- ☆44Updated last year
- Public repository containing materials for various malware-related streams.☆48Updated 2 weeks ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆242Updated last month
- Scapy sockets to communicate with Bluetooth controllers☆20Updated last month
- A library for intercepting system calls☆103Updated last year