travisgoodspeed / bsos
Berliner Spargel OS
☆12Updated 10 years ago
Alternatives and similar repositories for bsos:
Users that are interested in bsos are comparing it to the libraries listed below
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- A DOM-Inspired Ruby Smart Fuzzer☆56Updated 15 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- Passive History Scanner written in Python☆10Updated 3 years ago
- ☆17Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Threatbutt Suite☆37Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago
- Syscall Firewalls for VM Isolation☆11Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- distributed www CMS spyder☆8Updated 7 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 9 years ago
- Translate regular Assembly into Extended Instructions☆86Updated 12 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- All related files and slides for past talks☆44Updated last year