Writes a custom message to your master boot record, inspired by XKCD
☆16Apr 9, 2015Updated 10 years ago
Alternatives and similar repositories for mbr-lovenote
Users that are interested in mbr-lovenote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- 进程保护、进程过滤的小工程、主要亮点是在内核中对操作系统中的用户进行管理☆16Nov 5, 2014Updated 11 years ago
- Modifications to the Unity3D Standard shader so that it will work with Texture Arrays.☆12Aug 11, 2021Updated 4 years ago
- ☆12Feb 4, 2025Updated last year
- ☆23Mar 27, 2019Updated 6 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- An MCP server for the x64dbg debugger☆31Mar 30, 2025Updated 11 months ago
- c++ implementation of a simple-virtual-machine☆14Sep 19, 2014Updated 11 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆31Jul 18, 2014Updated 11 years ago
- Decoding Google Chrome browser passwords using DPAPI☆14Mar 28, 2017Updated 8 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- The AMSI server for Avred☆33Sep 15, 2023Updated 2 years ago
- Linux rootkit for educational purposes☆35Mar 27, 2024Updated last year
- ☆13Oct 14, 2017Updated 8 years ago
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆27Feb 29, 2020Updated 6 years ago
- Cheap shadowing for mobile/VR (Originally by ozlael)☆24May 25, 2023Updated 2 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 4 months ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- A test of using FishNet with Epic Online Services Relay/Lobby and Vivox voice.☆20Mar 13, 2023Updated 3 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- CTFd Theme for StormCTF (Updated a little bit for the newest version of CTFd)☆12May 19, 2019Updated 6 years ago
- The Art of the Steal / Deal - Made in Austria - Collection of Token White Papers on the Blockchain - Incl. Scam Alert - Thanks for your m…☆10Jan 2, 2021Updated 5 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆26May 7, 2016Updated 9 years ago
- eda-3 from many years ago☆14Sep 5, 2014Updated 11 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago
- Error Level Analysis (ELA) in ImageJ☆10Oct 17, 2019Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago