☆29Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for token-turbulenz
Users that are interested in token-turbulenz are comparing it to the libraries listed below
Sorting:
- ☆11Mar 26, 2018Updated 7 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 9 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 3 months ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- Plugin for BinaryNinja that provides bookmarking functionality☆21Feb 11, 2021Updated 5 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆25Jan 16, 2026Updated last month
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆29Apr 8, 2024Updated last year
- ☆28Aug 10, 2019Updated 6 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- ☆12Oct 13, 2019Updated 6 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Code for the paper "CBVLM: Training-free Explainable Concept-based Large Vision Language Models for Medical Image Classification", Comput…☆17Nov 24, 2025Updated 3 months ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- This library is for simplified work with the sms-man.com API☆18Jan 18, 2022Updated 4 years ago
- ☆12Oct 1, 2024Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- ☆41Dec 8, 2021Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- ☆29Dec 11, 2025Updated 2 months ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Aug 1, 2025Updated 7 months ago
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Devalopers is an online platform (backend here) that allows Tech Companies in Globally and especially in MENA to post jobs and projects w…☆12Jan 24, 2023Updated 3 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- EmerCoin SSH PKI and distributed ACL☆15Mar 4, 2017Updated 9 years ago
- NeonGoby alias analysis checker☆14Jul 2, 2013Updated 12 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago