Antelox / FOPO-PHP-DeobfuscatorView external linksLinks
A simple script to deobfuscate PHP file obfuscated with FOPO Obfuscator - http://fopo.com.ar/
☆86May 4, 2017Updated 8 years ago
Alternatives and similar repositories for FOPO-PHP-Deobfuscator
Users that are interested in FOPO-PHP-Deobfuscator are comparing it to the libraries listed below
Sorting:
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- ☆42May 10, 2016Updated 9 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 7 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- ☆14May 13, 2018Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- IoC's, PCRE's, YARA's etc☆24Mar 25, 2025Updated 10 months ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Aug 22, 2018Updated 7 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- CVE-2017-0213 for command line☆58Jul 1, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Privilege escalation tools on Mainframe☆83Aug 24, 2019Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- ☆10Oct 8, 2015Updated 10 years ago