valgaze / ghidrapracticeLinks
Learning about disassembling
☆20Updated 6 years ago
Alternatives and similar repositories for ghidrapractice
Users that are interested in ghidrapractice are comparing it to the libraries listed below
Sorting:
- WAF Exploitation Framework☆13Updated 2 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- ☆15Updated 12 years ago
- ☆18Updated 7 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Updated 7 years ago
- ☆19Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- A collection of useful radare2 scripts!☆32Updated 7 years ago
- Broadpwn bug (CVE-2017-9417)☆52Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- ☆40Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- ☆29Updated 5 years ago
- Decrypts Cisco VPN Group Passwords☆18Updated 14 years ago
- Get detailed information about a Twitter user activity☆17Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆53Updated 11 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- All related files and slides for past talks☆44Updated last month
- lulz: automated webstalking tool☆54Updated 9 years ago
- log file scrubber☆15Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago