Python libraries for Windows system coding
☆15May 13, 2020Updated 5 years ago
Alternatives and similar repositories for syskit
Users that are interested in syskit are comparing it to the libraries listed below
Sorting:
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- ATM security list☆12Aug 10, 2020Updated 5 years ago
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago
- RDP pentest tools & scripts☆67May 13, 2020Updated 5 years ago
- Tools and scripts dedicated to Android application security☆52Mar 3, 2021Updated 4 years ago
- SDR tools and scripts☆83Jan 29, 2020Updated 6 years ago
- Qualcomm baseband hacking stuff☆57Jul 22, 2020Updated 5 years ago
- Multithreaded HTTP scanner☆46Jun 3, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- ☆27May 26, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Tools and scripts for firmware reverse engeneering☆48Sep 18, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- GSM hacking tools and scripts☆57Jul 22, 2020Updated 5 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- ☆18Nov 7, 2017Updated 8 years ago
- 用来辅助分析VB程序的IDA插件☆25Dec 28, 2020Updated 5 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆26May 7, 2020Updated 5 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- Memory Loader Open Source Project by Sentinel-Labs.☆25Mar 26, 2021Updated 4 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago