solst-ice / hex.dance
simple client-side in-browser binary analysis and hex dump
☆57Updated last month
Alternatives and similar repositories for hex.dance:
Users that are interested in hex.dance are comparing it to the libraries listed below
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆62Updated 3 months ago
- Web based binary analysis☆84Updated 3 months ago
- Minimal setup to trigger the xz backdoor☆25Updated 4 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆292Updated last week
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆116Updated 2 months ago
- local language model for radare2☆149Updated this week
- A utility to inspect, validate, sign and verify machine learning model files.☆53Updated 3 weeks ago
- Damn Vulnerable UEFI☆270Updated 5 months ago
- ☆132Updated 10 months ago
- Steganography-Like CLI / Web tool for concealing files within JPG images.☆44Updated this week
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆42Updated 2 months ago
- ☆41Updated 7 months ago
- Compiling C to FlipJump☆87Updated last month
- Identify and extract files from container formats using unblob.☆23Updated 3 months ago
- In-Memory Rootkit For Linux☆70Updated 2 weeks ago
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆21Updated 11 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 3 months ago
- Binary Golf Grand Prix☆111Updated last year
- Binary Golf Grand Prix☆52Updated last month
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆72Updated last month
- A library for intercepting system calls☆70Updated last month
- ☆87Updated 6 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆78Updated 4 months ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆15Updated 2 months ago