NimdaKey's repositories
ReflectiveDLLInjection
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
AlphaGolang
IDApython Scripts for Analyzing Golang Binaries
asafw
Set of scripts to deal with Cisco ASA firmware [pack/unpack etc.]
awesome-ida
awesome IDA Pro resources collections. For Github Repos, extra info included: Star, Last Commit Time, Main Programming Language. Update Regularly!
awesome-vm-exploit
share some useful archives about vm and qemu escape exploit.
blackhat-go
As hackers, we put a premium on function over elegance as time is always scarce. When you need to quickly create a solution to a problem, style concerns come secondary.
blc
Integrate Ghidra's decompiler as an Ida plugin
dhexchange
a very simple 128bit Diffie–Hellman key exchange algorithm
DIR-850L_A1
DIR-850L A1 Firmware GPL source
embedded-toolkit
Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices, including for systems with many different ABIs (including more than 20 statically linked gdbserver executables)
fcn
内网穿透free connect your private network from anywhere
gdbserver
A tiny debugger implement the GDB Remote Serial Protocol. Can work on i386, x86_64, ARM and PowerPC.
Hades
Static code auditing system
Issue-198327
A Webkit RCE exploit and an SBX bug
linux-insides-zh
Linux 内核揭秘
linuxStack
Linux技术栈
misc
学习与工作中收集的一些资料
MS17-010
MS17-010
multiarch-gdbinit
multiarch-gdbinit
nfstream
NFStream: a Flexible Network Data Analysis Framework.
ret-sync
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra disassemblers.
ReverseSock5Proxy
A tiny Reverse Sock5 Proxy written in C :V
routeros
RouterOS Security Research Tooling and Proof of Concepts
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
v8-vulnerabilities
Corpus of public v8 vulnerability PoCs.
vscode-linux-kernel
Visual Studio Code project for Linux kernel sources