Collection of my Python Scripts
☆41Aug 14, 2020Updated 5 years ago
Alternatives and similar repositories for PythonScripts
Users that are interested in PythonScripts are comparing it to the libraries listed below
Sorting:
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Aug 11, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆17Dec 29, 2015Updated 10 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 10 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- fiddler output to pcap☆41Mar 17, 2014Updated 11 years ago
- Tool to analyze iOS crash reports☆29Jan 12, 2014Updated 12 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 8 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- ☆27Jul 29, 2013Updated 12 years ago
- Source code and sample exploits for the Stripe CTF Winter 2012☆44Mar 19, 2012Updated 13 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Reversing Google Drive and other goodies ;)☆27Sep 26, 2013Updated 12 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago