Library used to generate malicious PDF files for testing
☆43Nov 27, 2011Updated 14 years ago
Alternatives and similar repositories for heavy_pint
Users that are interested in heavy_pint are comparing it to the libraries listed below
Sorting:
- A tool for extracting data from Arbor SP via its REST APIs in order to generate reports☆11Dec 19, 2022Updated 3 years ago
- Okta Session Analyzer: A Python tool for detailed analysis and security monitoring of Okta event logs, designed to identify and alert on …☆21Nov 3, 2023Updated 2 years ago
- Arduino control of an EMV Smartcard reader for ATMs☆14Nov 22, 2017Updated 8 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- ☆16Nov 13, 2023Updated 2 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- ☆10Feb 7, 2020Updated 6 years ago
- ☆14Oct 22, 2025Updated 4 months ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- convert javascript shellcode to c source code☆11Mar 27, 2020Updated 5 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Guide to installing DCS World Standalone on linux. Mostly extracted from https://github.com/TheZoq2/dcs_on_linux?tab=readme-ov-file☆15Apr 24, 2025Updated 10 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Original set of icons on existing game consoles and some variants.☆14Nov 30, 2021Updated 4 years ago
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- LoRa Project using RYLR998 Module and Arudino Uno. Transmit and receive data over long range Lora Protocol☆10Jun 18, 2022Updated 3 years ago
- Reverse ip lookup tool written with go . Bing , Spyse , HackerTarget , ViewDns☆12May 14, 2022Updated 3 years ago
- Sample codes and datasets for COMM7780/ JOUR7280 @ HKBU☆13Aug 11, 2019Updated 6 years ago
- Telegram Bot, Anonymous Message, بات تلگرام☆10May 19, 2018Updated 7 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆10Apr 19, 2022Updated 3 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- This is a v2 version of my first IPMI script, but instead of hardcoding if statements this v2 uses a map function to map a temperature ra…☆11May 13, 2021Updated 4 years ago
- Defiant is a secure, powerful, Node.js framework built to support the development of disruptive technologies. It is a work in progress. …☆16Aug 20, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Library for reading values of APC UPS battery via the network☆15Mar 24, 2016Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- ☆21Feb 18, 2025Updated last year
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- A simple script to check your emails list using python.☆14Aug 7, 2020Updated 5 years ago