xryw32 / Lisa-dbgLinks
it's a cli debugger written in rust, it allows the placement of breakpoints, modifying elements at addresses, modifying the value of registers and other nice little things
☆15Updated 10 months ago
Alternatives and similar repositories for Lisa-dbg
Users that are interested in Lisa-dbg are comparing it to the libraries listed below
Sorting:
- it's a small program written in rust with only the standard library to analyze the headers of an elf64 file☆14Updated last year
- this is a small pe64 file analyzer in c++ with winapi, I didn't do it in the best way but hey, it's a small project like that that I tho…☆14Updated 10 months ago
- this is a translator of assembly to C language written in rust, THE PROJECT IS UNDER DEVELOPMENT!!☆17Updated last year
- it's a small random project that I made, it allows you to dump the code of a running process with some nice options and that's it, pleas…☆10Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆105Updated last year
- A collection of malware families and malware samples which use the Rust programming language.☆182Updated last year
- Osint tool to recover authors and emails on GitHub☆14Updated 4 months ago
- 🚀 Blazing fast and Powerful Stealer, no popo made with python☆23Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 10 months ago
- ⚡ Dynamically generated your Root-me.org stats for your github readmes☆22Updated 9 months ago
- Research framework for reverse engineering and cheat prototyping in Counter-Strike 2. Developed as part of a Master’s Thesis at UC3M.☆40Updated 3 months ago
- 🧞♂️ malware analysis☆37Updated last year
- SQL injection vulnerability scanner☆30Updated 8 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆58Updated last year
- ☆29Updated 5 years ago
- Discord HTTP requests interception POC, including backup codes requests, for educational purposes only.☆24Updated last year
- ☆54Updated last year
- POC | Steal user WhatsApp information/data☆73Updated 5 months ago
- yep full list of virustotal machines, OG REPO☆137Updated last year
- Koth - TryHackMe Tricks☆187Updated last year
- The Havoc Framework☆60Updated 3 years ago
- Create custom connections in your profile on Discord☆62Updated 4 years ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆157Updated last year
- Polymorphic Command & Control☆98Updated 7 months ago
- Templates for submissions☆82Updated 3 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆76Updated 7 months ago
- Linux Kernel Rootkit for modern kernels (6x)☆403Updated this week
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆279Updated 7 months ago
- Obfuscate the bytes of your payload with an association dictionary☆70Updated 5 months ago