4w4k3 / rePy2exeLinks
A Reverse Engineering Tool for py2exe applications.
☆210Updated 8 years ago
Alternatives and similar repositories for rePy2exe
Users that are interested in rePy2exe are comparing it to the libraries listed below
Sorting:
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- ☆166Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Updated 7 years ago
- Offline debugger for malware's reverse engineering☆116Updated 11 years ago
- Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.☆202Updated 10 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆147Updated 10 years ago
- Python toolkit for injecting DLL files into running processes on Windows☆254Updated 8 years ago
- [unmaintained] Post-exploitation tool☆181Updated 10 years ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- ☆128Updated 10 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Updated 7 years ago
- Runtime Process Manipulation☆240Updated last year
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- Tools for security challenges☆107Updated 4 months ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆266Updated 8 years ago
- Fuzzbunch Python-Wine wrapper☆56Updated 8 years ago
- some pocs for antivirus evasion☆131Updated 2 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325Updated 9 years ago
- my public code☆167Updated 9 years ago
- linux rootkit☆162Updated 7 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Updated 8 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- system scanner☆222Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Updated 5 years ago
- Fancy Bear Source Code☆263Updated 9 years ago
- Telnet Honeypot☆163Updated 6 years ago
- A Simple ARP Spoofer using Scapy☆108Updated 10 years ago