Locate articles and breaking news headlines from news sources and blogs across the web with JSON API
☆10Sep 6, 2022Updated 3 years ago
Alternatives and similar repositories for news
Users that are interested in news are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Threat Hijacking Simple Implementation☆20Feb 24, 2025Updated last year
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Process Creation, Image Load and Thread Creation Notification☆13Sep 15, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Android 各版本新特性及避坑指南☆14Jan 17, 2023Updated 3 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- Hands-on experiments to demonstrate the exploitability of insecure TLS configurations in Android apps☆15Jan 18, 2022Updated 4 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine…☆17Feb 5, 2015Updated 11 years ago
- ☆14Jul 20, 2020Updated 5 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- Disassembly Generation and Processing for JARV1S☆15Jul 15, 2025Updated 8 months ago
- ☆16Dec 20, 2021Updated 4 years ago
- Slides, codes, and materials related to my courses☆16Dec 19, 2025Updated 3 months ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Mar 18, 2023Updated 3 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆40Jan 27, 2020Updated 6 years ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- ☆11Mar 5, 2020Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Using a proxy d3d11 dll and function hooking to inject triangle drawing code into Skyrim☆13Jul 12, 2021Updated 4 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 10 years ago