Python tool to parse and decrypt files quarantined by windows defender
☆13Feb 25, 2023Updated 3 years ago
Alternatives and similar repositories for WinDefReleaser
Users that are interested in WinDefReleaser are comparing it to the libraries listed below
Sorting:
- A simple and classic Sudoku Game build in Android Studio with Kotlin for Android Users.☆16Feb 16, 2023Updated 3 years ago
- digital signature with SHA256withRSA in Java☆10Jul 15, 2017Updated 8 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Essential tools for security, easily install with scoop☆14Updated this week
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- 常用CTF爆破字典整理☆14Apr 8, 2023Updated 2 years ago
- Detection of malicious data exfiltration over DNS using Machine Learning techniques☆13Jul 8, 2020Updated 5 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆15Jul 10, 2025Updated 7 months ago
- a brief example of mqtt usage to send camera stream to web page☆11May 4, 2022Updated 3 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- WriteUps for CTF☆10Nov 13, 2024Updated last year
- A toolkit for CTF challenges☆10Jan 18, 2017Updated 9 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Gscan二开版☆12Apr 11, 2024Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- sql盲注日志分析工具GUI版本☆16Feb 17, 2024Updated 2 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆53Sep 23, 2022Updated 3 years ago
- Cybersecurity Data Mining Competition 2016☆11Jan 19, 2019Updated 7 years ago
- Materials from the CS Level-Up trainers☆11Aug 10, 2025Updated 6 months ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- 使用Docker一键制作vol3取证需要的的SymbolTables☆12Aug 31, 2025Updated 6 months ago
- Login and Signup form using PHP & MySQL. The code doesn't contain the elements to encrypt the password. You can enable it by using php bu…☆10Jan 27, 2019Updated 7 years ago
- Frida script to dump native libraries from running process on Android, inspired by frida_dump☆14Aug 16, 2023Updated 2 years ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- My custom Archlinux with Hyprland config with Installation script☆15May 12, 2025Updated 9 months ago
- ☆17Nov 14, 2022Updated 3 years ago
- Analyze, tweak and extract morse code from audio files.☆12Aug 25, 2022Updated 3 years ago
- Collection of Volatility2 profiles, generated against Linux kernels.☆54Oct 30, 2025Updated 4 months ago
- ☆11Nov 6, 2023Updated 2 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- my beautiful page <3☆20Updated this week
- A tool for replacing the Japanese text of Kirara Fantasia's story video.☆13Jan 16, 2019Updated 7 years ago
- ☆14Aug 7, 2025Updated 6 months ago
- An effort to write an UberStrike server emulator.☆13Jan 29, 2021Updated 5 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago