Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.
☆29Apr 3, 2025Updated last year
Alternatives and similar repositories for file-unpumper
Users that are interested in file-unpumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Aug 18, 2023Updated 2 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 3 weeks ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆32Dec 15, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated 2 years ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆89Aug 7, 2023Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- Effortlessly browse and manage your files with ease using Tiny File Manager [WH1Z-Edition], a compact single-file PHP file manager.☆25Feb 13, 2024Updated 2 years ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆53Feb 22, 2024Updated 2 years ago
- ☆34Jan 26, 2024Updated 2 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- A deobfuscator for Atomic obfuscator☆10Apr 28, 2020Updated 5 years ago
- Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear in…☆50May 18, 2025Updated 11 months ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 12 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Jun 10, 2025Updated 10 months ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆106Dec 8, 2025Updated 4 months ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆88May 11, 2024Updated last year
- Chrome extension tool for OSINT & Recon☆58Mar 12, 2024Updated 2 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆77Jan 6, 2026Updated 3 months ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆46Mar 22, 2026Updated 3 weeks ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- Dump .net assembly from a native loader which uses ClrCreateinstance☆57Oct 18, 2022Updated 3 years ago
- ☆10Apr 1, 2025Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆115May 19, 2023Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆186Jan 27, 2024Updated 2 years ago