Coder Social home page Coder Social logo

nimdakey's Projects

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

awesome-ida icon awesome-ida

awesome IDA Pro resources collections. For Github Repos, extra info included: Star, Last Commit Time, Main Programming Language. Update Regularly!

awesome-ios-resource icon awesome-ios-resource

:iphone: A curated list of awesome iOS resources, including conferences, books, blogs, articles, websites and documentations

awesome-iot-hacks icon awesome-iot-hacks

A Collection of Hacks in IoT Space so that we can address them (hopefully).

badkernel icon badkernel

Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016

beroot icon beroot

Windows Privilege Escalation Tool

bincat icon bincat

Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction.

blackhat-go icon blackhat-go

As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.

blc icon blc

Integrate Ghidra's decompiler as an Ida plugin

blueborne icon blueborne

PoC scripts demonstrating the BlueBorne vulnerabilities

bochspwn-reloaded icon bochspwn-reloaded

A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3

boofuzz icon boofuzz

A fork and successor of the Sulley Fuzzing Framework

bootstomp icon bootstomp

BootStomp: a bootloader vulnerability finder

botox icon botox

Refer to https://code.google.com/p/botox

browsersecurity icon browsersecurity

我在学习浏览器安全过程中整理的漏洞分析笔记与相关的学习资料

c0f icon c0f

CAN of Fingers (c0f) creates passive fingerprints of Make and Model over CAN bus

cantoolz icon cantoolz

CANToolz - framework for black-box CAN network analysis

cgpwn icon cgpwn

A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks

chakra-2016-11 icon chakra-2016-11

Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)

chimay-red-1 icon chimay-red-1

Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.