
- Arizona, United States
-
04:58
- 7h behind - nickb.website
- @nick_botticelli@mastodon.social
Starred repositories
Samsung Seamless Codec (SSC) partially reverse-engineered
DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely
34306 / IOSurface_poc18
Forked from tomitokics/IOSurface_poc18App with PoC of CVE-2024-44285
A list of Java obfuscators, obfuscated samples and benchmarks.
Official code implementation of General OCR Theory: Towards OCR-2.0 via a Unified End-to-end Model
Logstash - transport and process your logs, events, or other data
Awesome multilingual OCR toolkits based on PaddlePaddle (practical ultra lightweight OCR system, support 80+ languages recognition, provide data annotation and synthesis tools, support training and…
Ready-to-use OCR with 80+ supported languages and all popular writing scripts including Latin, Chinese, Arabic, Devanagari, Cyrillic and etc.
OpenMMLab Text Detection, Recognition and Understanding Toolbox
Web scraper using Cloudflare Workers
C library for manipulating MachO/FAT files and their code signatures
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
Tools to perform differential fault analysis attacks (DFA).
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager
PoC Implementation of a fully dynamic call stack spoofer