Stars
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Deezer source separation library including pretrained models.
A True Instrumentable Binary Emulation Framework
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
Tool for partial deblobbing of Intel ME/TXE firmware images
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
Hook and simulate global keyboard events on Windows and Linux.
IDA plugin which queries language models to speed up reverse-engineering
A pure-python fully automated and unattended fuzzing framework.
Dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x.
Taking one back for Steve Irwin (๑•̀ㅂ•́)و
Sending and receiving 433MHz signals with cheap GPIO RF modules on a Raspberry Pi
List of major web + mobile browser user agent strings. +1 Bonus script to scrape :)
Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)
Pyhton scripts that can change your Windows fingerprints and ID
Repository of modules and signatures contributed by the community
A Binary Ninja plugin for vulnerability research.
PentHertz / Modmobmap
Forked from Synacktiv-contrib/ModmobmapMap 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.
CVE-2020-0688_EXP Auto trigger payload & encrypt method
(PoC) Python version of CVE-2019-11043 exploit by neex