9b / heavy_pintView external linksLinks
Library used to generate malicious PDF files for testing
☆43Nov 27, 2011Updated 14 years ago
Alternatives and similar repositories for heavy_pint
Users that are interested in heavy_pint are comparing it to the libraries listed below
Sorting:
- Gathers current reported online malicious websites and grabs the content for offline analyzing☆14Mar 9, 2019Updated 6 years ago
- Query Builder wrapper for Codeigniter 3.☆18Oct 21, 2024Updated last year
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- Okta Session Analyzer: A Python tool for detailed analysis and security monitoring of Okta event logs, designed to identify and alert on …☆20Nov 3, 2023Updated 2 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- PHPSGI is an interface between PHP web applications and web servers☆37Dec 3, 2015Updated 10 years ago
- A unique security module for the Linux operating system☆12Sep 17, 2024Updated last year
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- ☆14Oct 22, 2025Updated 3 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 5 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- RDS message logger using a silicon labs si470x chip connected to a raspberry pi☆11Apr 18, 2015Updated 10 years ago
- Script to download ibooks from www.allitebooks.com☆10Oct 4, 2018Updated 7 years ago
- LoRa Project using RYLR998 Module and Arudino Uno. Transmit and receive data over long range Lora Protocol☆10Jun 18, 2022Updated 3 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- ☆13Nov 25, 2025Updated 2 months ago
- ☆12May 9, 2017Updated 8 years ago
- 1998 implementation of PPP + TCP/IP + various network apps for ZX Spectrum 48k☆10Apr 22, 2016Updated 9 years ago
- This is a v2 version of my first IPMI script, but instead of hardcoding if statements this v2 uses a map function to map a temperature ra…☆11May 13, 2021Updated 4 years ago
- Software for the OpenLD Lucid Dreaming Research Platform☆14Dec 3, 2016Updated 9 years ago
- Defiant is a secure, powerful, Node.js framework built to support the development of disruptive technologies. It is a work in progress. …☆16Aug 20, 2020Updated 5 years ago
- A port of PrBoom to Psion EPOC R5 devices.☆13Aug 29, 2019Updated 6 years ago
- ☆21Feb 18, 2025Updated 11 months ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Sublime Text 2 Cisco Snippets. This package includes various snippets for Cisco routers/switch/firewall configurations.☆17Jul 31, 2018Updated 7 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- A simple script to check your emails list using python.☆14Aug 7, 2020Updated 5 years ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated last year
- A tool to brute force forms based authentication mechanism☆11Nov 2, 2019Updated 6 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago