CS2110 at Georgia Tech
☆13Feb 26, 2019Updated 7 years ago
Alternatives and similar repositories for Computer-Organization-and-Programming
Users that are interested in Computer-Organization-and-Programming are comparing it to the libraries listed below
Sorting:
- A simple, reliable and reasonably fast network capture analyzer.☆26Updated this week
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- generates unique subdomain names and runs httpx on them☆17Apr 8, 2024Updated last year
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆51Jul 30, 2021Updated 4 years ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 2 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 8 months ago
- My public talks☆14Oct 1, 2024Updated last year
- Slurps down the most popular plugins and themes from WordPress.org☆16Feb 14, 2026Updated 3 weeks ago
- Collections of code obfuscation libaries for different languages ( in progress )☆15Mar 18, 2023Updated 2 years ago
- windows/x86 brainfuck compiler☆15May 11, 2017Updated 8 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- Binaries, drivers, PoCs and other stuff on Hydroph0bia vulnerability (CVE-2025-4275)☆40Jun 20, 2025Updated 8 months ago
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆22Oct 12, 2022Updated 3 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- some kernel pwn practice questions.☆24Nov 25, 2024Updated last year
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 4 years ago
- cheatsheets, dotfiles, scripts...☆18Dec 28, 2025Updated 2 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Repo containing course materials from our paper, "Pwn Lessons Made Easy With Docker: Towards an Undergraduate Vulnerability Research Cybe…☆19Mar 8, 2024Updated last year
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Improved version of pintool☆17Jul 24, 2016Updated 9 years ago
- Python decompiler. Written in JavaScript. Works in NodeJS. Decompiles extremely fast.☆26Feb 22, 2026Updated last week
- ☆26Aug 5, 2025Updated 7 months ago
- Finds Documents On Cloud Assets Using grayhatwarfare API for short urls☆23Mar 2, 2022Updated 4 years ago
- A docker environment which could run and debug multiarch program, such as mips, arm☆18Nov 25, 2020Updated 5 years ago
- ☆18May 9, 2020Updated 5 years ago
- Solution for cryptohack challenges☆21Oct 6, 2021Updated 4 years ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆65Jan 13, 2026Updated last month
- Protobuf file descriptor extractor☆23Jun 15, 2019Updated 6 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- A curated list of awesome Assembler and Machine Codes☆32Oct 7, 2023Updated 2 years ago
- A curated list of awesome wireshark dissector. Inspired by awesome awesomeness☆16Feb 17, 2016Updated 10 years ago