EgeBalci / BitBender
BitBender is a byte manipulation tool
☆12Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for BitBender
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Virtual host brute forcer☆22Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 3 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- simple rootkit for computer security class☆13Updated 11 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆22Updated 7 years ago