static binaries linux i386
☆116Jul 2, 2015Updated 10 years ago
Alternatives and similar repositories for static-binaries-i386
Users that are interested in static-binaries-i386 are comparing it to the libraries listed below
Sorting:
- The build scripts for static-linux☆14Aug 26, 2015Updated 10 years ago
- A set of commonly-used static binaries☆205Oct 8, 2024Updated last year
- Various *nix tools built as statically-linked binaries☆3,619Aug 21, 2023Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆12May 1, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- 🥞 可愛鬆餅 Telegram bot☆11Mar 8, 2025Updated 11 months ago
- ☆18Nov 24, 2020Updated 5 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- ☆23Jun 17, 2024Updated last year
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- ☆145Mar 27, 2023Updated 2 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆53May 30, 2019Updated 6 years ago
- 🌊 Dockerfiles for apps I use. Also take a look at https://github.com/security-dockerfiles☆24Dec 24, 2020Updated 5 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- ☆28Apr 3, 2018Updated 7 years ago
- MT Manager☆13Jun 3, 2023Updated 2 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- GitHub Actions at your fingertips! ✨☆32Feb 21, 2021Updated 5 years ago
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆69Jan 17, 2023Updated 3 years ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- Image Tragick Exploit Tool Using Burp Collaborator☆35May 24, 2024Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Apr 2, 2021Updated 4 years ago
- Source code for the DEF CON 32 CTF Qualifiers.☆76May 24, 2024Updated last year
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- Safari 1day RCE Exploit☆155Mar 22, 2025Updated 11 months ago
- CVE-2023-0386在ubuntu22.04上的提权☆414Jun 13, 2023Updated 2 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆43Mar 13, 2025Updated 11 months ago
- ☆33Feb 25, 2022Updated 4 years ago
- A collection of statically compiled tools like Nmap and Socat.☆477Mar 22, 2024Updated last year
- ☆50Sep 11, 2019Updated 6 years ago
- ☆12Updated this week
- Using tuntap to simulate router port, implement software router and related network functions with C.☆15Sep 27, 2020Updated 5 years ago
- Import Nmap scans to Cherrytree☆36Jul 4, 2022Updated 3 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago