ysf's repositories
kali-post-install
kali installation helper files
AUR-binaryninja-personal-dev
Do not use, check AUR-binaryninja-personal instead.
bamboo
browser fuzzer
BinExp
Linux Binary Exploitation
bleah
A BLE scanner for "smart" devices hacking.
boxes
Stuff to manage virtual machines
ctf-katana
This repository aims to hold suggestions (and hopefully/eventually code) for CTF challenges. The "project" is nicknamed Katana.
CTF-pwn-tips
Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.
dotfiles
My dotfiles, and other config related things
ds1963s-utils
Utilities and tools for the DS1963S iButton dongle.
EoPCardGameGerman
German translation of the Microsoft Elevation of Privilege card game along with notes and examples
freedomfighting
A collection of scripts which may come in handy during your freedom fighting activities.
git-jokes
Collection of questionably humorous git sayings
gkap
Praktikum Graphentheorie und komplexe Algorithmen HAW W2014
mitmproxy
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
nrf5x-tools
Nordic Semiconductor nRF5x series disassembly tools
php-pam
PHP PAM module for PHP 7.x
python-support.nvim
use a single command :PythonSupportInit to initialize python support for neovim.
radiobit
Micro:Bit Radio framework
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
ropc
A Turing complete ROP compiler
ropc-llvm
ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.
scff
softScheck Cloud Fuzzing Framework
tmux-fingers
copy pasting in terminal with vimium/vimperator like hints.
tmux-picker
Selecting and copy-pasting in terminal using Vimium-like hint mode.
unicorn
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)
Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems