Automatic detection of hashing algorithms
☆20Jun 18, 2016Updated 9 years ago
Alternatives and similar repositories for hasher
Users that are interested in hasher are comparing it to the libraries listed below
Sorting:
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Bot de telegram para obtener la cotización del dolar actualizado en Paraguay☆13Sep 23, 2015Updated 10 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- Everything about Parasite and more.☆21Apr 7, 2016Updated 9 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Es una API REST desarrollada en NODE.JS para obtener cotizaciones de casas de cambio. En paraguay.☆18Nov 30, 2015Updated 10 years ago
- zer0m0n driver for cuckoo sandbox☆87Jul 12, 2016Updated 9 years ago
- tools for vita☆28Sep 21, 2018Updated 7 years ago
- A small utility to read and write to Macs physical memory using default AppleHWAccess.kext.☆25Sep 3, 2015Updated 10 years ago
- A simple file-server which runs on top of Github pages☆25Aug 16, 2020Updated 5 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Node kickass.to json API wrapper☆21Jul 26, 2016Updated 9 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- Previewing (J)SCAD 3D models inside Atom.☆31Sep 1, 2018Updated 7 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- 修改htcap的数据库为mysql☆24Jul 9, 2017Updated 8 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- Unpacking tool for Inno Setup installers☆39Mar 9, 2024Updated last year
- 3.60 module dump☆29Aug 9, 2017Updated 8 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Orchestration and memory for multi-agent systems☆14Feb 6, 2026Updated 3 weeks ago
- Go SDK and CLI for LM Studio: manage, interact, and run LLMs via WebSocket API☆11Sep 8, 2025Updated 5 months ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Generate 3d printable braille from text using OpenJsCad☆16Aug 3, 2013Updated 12 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- Hide secret information in typographical errors☆31Dec 4, 2015Updated 10 years ago
- ☆74Jul 13, 2022Updated 3 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago