TG 2016 hacking compo repo
☆10Mar 31, 2016Updated 9 years ago
Alternatives and similar repositories for tg16hack
Users that are interested in tg16hack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TGHack 2017 repo☆17Mar 29, 2019Updated 6 years ago
- This is a repository for a fork project of OSMOCOM SIM Tools☆13Dec 5, 2018Updated 7 years ago
- OCaml tutorial conducted at Abstraction 2019 (https://abstraction-iitm.surge.sh)☆15Apr 21, 2019Updated 6 years ago
- x-editable for react☆11Dec 8, 2015Updated 10 years ago
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- Ghostly: Code for the AI compo case at The Gathering 2017☆17Jun 8, 2021Updated 4 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Jan 16, 2019Updated 7 years ago
- List of Red Team Resources☆17Jun 16, 2020Updated 5 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- FPGA implementation of TIS100 system☆19Feb 25, 2020Updated 6 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- A repository of public agent modules☆21Jun 10, 2024Updated last year
- Perixx MX-3000 mouse unofficial configuration tool for Linux☆21Mar 1, 2018Updated 8 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Simple MIPS32 Emulator (primarily used to run SmallerC compiled for MIPS)☆18Oct 31, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- The code for various Counter-Strike: Global Offensive hacks☆16Jul 7, 2014Updated 11 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 13 years ago
- Basic Mach-O binary parser.☆24Nov 16, 2016Updated 9 years ago
- Utilities for testing Kubernetes installations☆12Jan 16, 2018Updated 8 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- ☆32Apr 29, 2017Updated 8 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- Java Blocklist Tools☆33Nov 29, 2023Updated 2 years ago
- Some debug notes and exploit(not blind)☆39Jul 28, 2019Updated 6 years ago
- A tour of what some Rust language features look like after compilation.☆50Jun 7, 2023Updated 2 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- A mapreduce implementation of SLCT (http://ristov.users.sourceforge.net/slct/) using Disco.☆16Sep 20, 2011Updated 14 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- StIm - Star Improved☆17Aug 20, 2021Updated 4 years ago
- whisk is a data science project framework that makes collaboration, reproducibility, and deployment "just work".☆11Dec 26, 2022Updated 3 years ago
- ☆31Nov 28, 2023Updated 2 years ago
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- Procedural Fairings mod for Kerbal Space Program☆75Dec 12, 2019Updated 6 years ago