☆81Oct 2, 2025Updated 5 months ago
Alternatives and similar repositories for pdf_object_hashing
Users that are interested in pdf_object_hashing are comparing it to the libraries listed below
Sorting:
- ☆58Dec 10, 2025Updated 2 months ago
- ☆13Dec 29, 2022Updated 3 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- The code I write in my blog☆83Feb 21, 2026Updated last week
- ☆22Jul 28, 2020Updated 5 years ago
- Resources from Trend Micro Research teams☆26Nov 14, 2024Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- Performant parser for textual data (CSV parser)☆34Oct 28, 2018Updated 7 years ago
- ☆48Nov 26, 2025Updated 3 months ago
- Tool to help to cryptanalysis for cybersecurity researcher, cryptanalysis exploit developers and CTF players☆27Sep 15, 2025Updated 5 months ago
- ☆27Jul 11, 2022Updated 3 years ago
- ☆10Feb 12, 2026Updated 3 weeks ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- Assisting Go Analysis and Reversing☆98Nov 13, 2025Updated 3 months ago
- QRSS Plus: live QRSS grabbers from around the world☆10Feb 9, 2026Updated 3 weeks ago
- Scripts and packages to install Arch Linux Arm on Tegra K1☆10Dec 7, 2022Updated 3 years ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- An easy-to-install ChatGPT clone you can host on your own web server and access from a web browser.☆10May 26, 2023Updated 2 years ago
- Tool to start processes as SYSTEM using token duplication☆37Oct 27, 2020Updated 5 years ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago
- ☆40Feb 23, 2023Updated 3 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- macOS Endpoint Security Message Analysis Tool☆47Jan 31, 2022Updated 4 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆28Updated this week
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- GUI for Trusted eSign☆15Feb 27, 2019Updated 7 years ago
- Kernel source build instructions and scripts for the ARK Jetson Carrier☆14Updated this week
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Mindmap for OWASP Top 10 LLM Application and Relationship between them☆13Dec 11, 2024Updated last year
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 9 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- A Sublime Text 2 Plugin that can generate a sequence of numbers using search and replace.☆28Sep 29, 2019Updated 6 years ago
- A Streamlit-based chatbot application using Gemini models for NLP. Features include light/dark mode toggle, model selection (Gemini 1.5 F…☆10May 23, 2024Updated last year
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆81Nov 1, 2025Updated 4 months ago
- Gameboy for the Thumby☆12Jan 12, 2022Updated 4 years ago