Lists (1)
Sort Name ascending (A-Z)
Stars
The RF and reverse engineering framework for everyone. Follow and ★ to show your support!
This project demonstrates how a convolutional neural network can be used to detect the boundaries of a function in compiled code
A curated list of awesome warez and piracy links
The ultimate WinRM shell for hacking/pentesting
Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authenticat…
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…