valgaze / ghidrapracticeLinks
Learning about disassembling
☆20Updated 5 years ago
Alternatives and similar repositories for ghidrapractice
Users that are interested in ghidrapractice are comparing it to the libraries listed below
Sorting:
- WAF Exploitation Framework☆13Updated 2 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- A collection of useful radare2 scripts!☆32Updated 7 years ago
- ☆18Updated 7 years ago
- ☆15Updated 11 years ago
- ☆29Updated 5 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 7 years ago
- ☆18Updated 7 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆37Updated 7 years ago
- ☆40Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- ☆17Updated 7 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Updated 6 years ago
- Trying to hack into keyboards☆86Updated 6 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- ☆11Updated 6 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆19Updated 8 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Proof-of-concept malware programs. For educational purpose only.☆24Updated 8 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 11 years ago