Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack
☆46Nov 13, 2024Updated last year
Alternatives and similar repositories for yomani-unpacker
Users that are interested in yomani-unpacker are comparing it to the libraries listed below
Sorting:
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆20Nov 10, 2023Updated 2 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- This repo hosts an MCP server for volatility3.x☆40Jul 9, 2025Updated 8 months ago
- ☆34Feb 25, 2023Updated 3 years ago
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 6 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Aug 27, 2019Updated 6 years ago
- A YARA rule generator☆66Feb 8, 2026Updated last month
- Convert your local XML file into a HTML table, Export XML as CSV/JSON and Visualize XML in 2D/3D force directed d3 graphs☆10Aug 24, 2022Updated 3 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- An implementation in C of the pixel sorting algorithm used to glitch pictures.☆10Nov 2, 2017Updated 8 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Collaboration platform for reverse engineering tools.☆46Dec 20, 2024Updated last year
- scrapped ideas and garbage code☆13May 8, 2021Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Research_speech_speaker_verification_nist_sre2010☆12Mar 1, 2016Updated 10 years ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Documentation of the game "Flugzeuge bauen mit Willy Werkel"☆10Sep 5, 2016Updated 9 years ago
- MVP for updated PEP 543 proposal☆14Feb 13, 2026Updated 3 weeks ago
- ☆10Sep 8, 2015Updated 10 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- speech to text gui for different (mostly Whisper, also Voxtral) models and backends, including whisper.cpp, mlx-whisper, faster-whisper, …☆11Dec 7, 2025Updated 3 months ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Spec for the Flat Image Tree (FIT) specification☆14Updated this week
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month