yara-parser
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
The HID iClass line of proximity cards and readers, known for its encryption and mutual authentication, has a vulnerability that allows retrieval of the master authentication key, enabling cloning of cards and changing reader settings. The method involves exploiting debug pins on specific readers to modify firmware and extract the key.
A Go library for manipulating YARA rulesets with the ability to programatically change metadata, rule names, and more.
Search gadgets on binaries to facilitate ROP exploitation.
A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Python 3 tool for parsing Yara rules with ongoing development.
A Python library for automating time-based blind SQL injection attacks
A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities