Example implementations of PEP 578 and 551 entry points
☆35May 12, 2025Updated 10 months ago
Alternatives and similar repositories for spython
Users that are interested in spython are comparing it to the libraries listed below
Sorting:
- Hosted analyzers built for Grapl☆14Dec 26, 2022Updated 3 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- ☆11Feb 23, 2025Updated last year
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 5 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- ☆11Oct 27, 2022Updated 3 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Simple error lookup for Win32 and NTSTATUS errors☆20Nov 25, 2018Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- A barebones utility for metamorphic testing in Rust☆19Oct 22, 2019Updated 6 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Annotate IDA with source and line number information from a PDB☆15Apr 15, 2021Updated 4 years ago
- A full guide on how to set up WSL/WSL2 and use Windows Terminal or Terminator as the terminal emulator. Some tricky X11 configuration is …☆14Nov 3, 2019Updated 6 years ago
- Fuzzers implemented with libafl to evaluate several techniques on fuzzbench☆13Oct 10, 2024Updated last year
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 7 years ago
- ATNwalk is a grammar-based input generator for fuzzing and other evolutionary algorithms. It relies on binary-level mutations to bit sequ…☆11Dec 10, 2024Updated last year
- Small portable regex in C (cbmc verified, and extended)☆13Jun 6, 2023Updated 2 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Just little bits.☆10Aug 5, 2025Updated 7 months ago
- ☆13May 16, 2019Updated 6 years ago
- OS Lockdown☆13Nov 21, 2017Updated 8 years ago
- Inference on marginal distributions using gradient-based optimization☆13Mar 27, 2017Updated 8 years ago
- boat running on the taximachine☆11Nov 21, 2025Updated 4 months ago
- 批量扫描TomcatAJP漏洞☆15Feb 22, 2020Updated 6 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Scapy hands-on☆36Nov 16, 2023Updated 2 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Dec 21, 2023Updated 2 years ago