Brute forcing scripts for bad CTF problems
☆47May 18, 2020Updated 5 years ago
Alternatives and similar repositories for bruteforce
Users that are interested in bruteforce are comparing it to the libraries listed below
Sorting:
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- ☆12Jan 28, 2026Updated last month
- Small ESP32 PCB to drive LED Strips☆12Jul 2, 2019Updated 6 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 2 months ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Collection of Apple related symbols - from DWARF/dSYMs and hand generated☆20Mar 5, 2024Updated 2 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Automatic Vulnerability Discovery☆38Mar 30, 2019Updated 6 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Apr 10, 2020Updated 5 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆23Jun 8, 2022Updated 3 years ago
- An evolutionary, coverage-guided greybox network protocol fuzzer☆21Aug 31, 2021Updated 4 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Mar 2, 2021Updated 5 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Mar 12, 2019Updated 6 years ago
- Ghidra Program Analysis Library☆346Jun 28, 2023Updated 2 years ago
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆221Nov 3, 2023Updated 2 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Nov 19, 2020Updated 5 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- Intrusion Detection Honeypots Book Code☆28Aug 31, 2020Updated 5 years ago