stong / bruteforceView external linksLinks
Brute forcing scripts for bad CTF problems
☆47May 18, 2020Updated 5 years ago
Alternatives and similar repositories for bruteforce
Users that are interested in bruteforce are comparing it to the libraries listed below
Sorting:
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Small ESP32 PCB to drive LED Strips☆12Jul 2, 2019Updated 6 years ago
- ☆12Jan 28, 2026Updated 2 weeks ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 5 years ago
- MIPS32 emulation fuzzing☆13Nov 17, 2020Updated 5 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated last month
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- Collection of Apple related symbols - from DWARF/dSYMs and hand generated☆19Mar 5, 2024Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Python YouTube Video Downloader☆16May 25, 2020Updated 5 years ago
- AFL training workshop materials☆20Aug 11, 2018Updated 7 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆21Apr 10, 2020Updated 5 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Jun 8, 2022Updated 3 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Mar 2, 2021Updated 4 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Thinkpad X220 board that disconnects the webcam and microphone data lines☆44Mar 12, 2019Updated 6 years ago
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆219Nov 3, 2023Updated 2 years ago
- Ghidra Program Analysis Library☆346Jun 28, 2023Updated 2 years ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 9 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Nov 19, 2020Updated 5 years ago
- Intrusion Detection Honeypots Book Code☆26Aug 31, 2020Updated 5 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- Makes dynamic linked shit "static". Amazing☆26Mar 23, 2021Updated 4 years ago
- 🍰 Compiling your code to an Ising Hamiltonian so you don't have to!☆53Apr 30, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Dec 11, 2019Updated 6 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- Decode machine code into VEX IR and translate into LLVM IR☆28Jun 1, 2019Updated 6 years ago
- weggli ruleset scanner for source code and binaries☆37Nov 16, 2025Updated 2 months ago
- Dockerfiles for (un)popular fuzzers!☆30Apr 15, 2020Updated 5 years ago
- Python for Web Scraping Workshop☆10Jun 4, 2021Updated 4 years ago