wunderwuzzi23 / token-turbulenzView external linksLinks
☆29Jul 6, 2023Updated 2 years ago
Alternatives and similar repositories for token-turbulenz
Users that are interested in token-turbulenz are comparing it to the libraries listed below
Sorting:
- ☆11Mar 26, 2018Updated 7 years ago
- Linear IL view for Binary Ninja☆13Feb 28, 2017Updated 8 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 2 months ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- ☆25Jan 16, 2026Updated last month
- Quickly open your favorite Web IDE to review the selected smart contract codebase☆29Apr 8, 2024Updated last year
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- ☆12Oct 13, 2019Updated 6 years ago
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- Smart Sessions with EIP-7702 EOA☆16Nov 15, 2024Updated last year
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ☆41Dec 8, 2021Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- ☆29Dec 11, 2025Updated 2 months ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- moddwatch watches files and directories for modifications☆18May 23, 2025Updated 8 months ago
- ☆13Oct 30, 2022Updated 3 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- VideoReTalking-HQ is a high-quality video retalking tool for enhancing and synchronizing video frames with audio inputs using advanced fa…☆13Jun 13, 2024Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆88Aug 1, 2025Updated 6 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆40Nov 24, 2013Updated 12 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year