GithubHelp home page GithubHelp logo

Rich Moulton's Projects

algorithms icon algorithms

Minimal examples of data structures and algorithms in Python

apimon icon apimon

A simple API monitor for Windbg

arminject icon arminject

An application to dynamically inject a shared object into a running process on ARM architectures.

arpping icon arpping

This is a simple ARP Ping scanner, with verbose comments; takes CIDR address format (e.g. 192.168.1.0/24)

awesome-hacking icon awesome-hacking

A collection of various awesome lists for hackers, pentesters and security researchers

awesome-mobile-security icon awesome-mobile-security

An effort to build a single place for all useful android and iOS security related stuff. All references and tools are belong to their respective owners. I'm just maintaining it.

axiom icon axiom

A dynamic infrastructure toolkit for red teamers and bug bounty hunters!

beacon icon beacon

Simple automatic (local) network discovery in C#

beautiful-jekyll icon beautiful-jekyll

:sparkles: Build a beautiful and simple website in literally minutes. Demo at http://deanattali.com/beautiful-jekyll

binnavi icon binnavi

BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.

bitstarter icon bitstarter

A barebones Node.js app using the Express framework.

chaosquest icon chaosquest

Remote-Friendly Team Building Game Featuring Chaos Engineering

cimsweep icon cimsweep

CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.

clink icon clink

Bash's powerful command line editing in cmd.exe

cmdsave icon cmdsave

dump contents of cmd.exe console window buffer to a file

commix icon commix

Automated All-in-One OS Command Injection and Exploitation Tool

coursera-algorithmic-toolbox icon coursera-algorithmic-toolbox

This repository contains all the solutions for the assignments of the course - Algorithmic Toolbox offered on Coursera.

csc-748-software-exploitation-spring-2020 icon csc-748-software-exploitation-spring-2020

This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools as well as the process of exploitation discovery and development. Vulnerability analysis, debugging, fuzzing, shellcode, and mitigation techniques will be explored. Both Windows and Linux platforms will be covered.

cve-2014-7920-7921 icon cve-2014-7920-7921

Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.