stealth / 7350topless
☆8Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for 7350topless
- The Multiplatform Linux Sandbox☆15Updated 11 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Polyglot detector☆19Updated 7 months ago
- The Dumb Network Fuzzer☆19Updated last year
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆13Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 4 years ago
- Base64 Mutator☆12Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- ☆36Updated 5 years ago
- The hydrabus framework core [Not maintained anymore - see readme]☆21Updated last year
- ☆26Updated last year
- ☆13Updated 4 years ago
- ☆26Updated 5 years ago
- Content related to hardware hacking☆46Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago