☆323Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for project-memoria-detector
Users that are interested in project-memoria-detector are comparing it to the libraries listed below
Sorting:
- ☆26Oct 13, 2021Updated 4 years ago
- Statically compiled binaries for various architectures.☆18Oct 12, 2022Updated 3 years ago
- A DFIR tool written in Python.☆1,052Jun 9, 2021Updated 4 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Set of tools to analyze Tinynuke samples☆15Nov 18, 2021Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- IKE fuzzer☆29May 29, 2015Updated 10 years ago
- TRRespass☆127May 5, 2021Updated 4 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Mar 2, 2026Updated last week
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆804May 19, 2024Updated last year
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 8 months ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- A Python implementation of the Community ID flow hashing standard☆23Nov 29, 2023Updated 2 years ago
- Network Forensic Extendable Analysis Tool☆39May 22, 2022Updated 3 years ago
- PoC exploits I wrote. They're as is and I will not offer support☆278Apr 30, 2024Updated last year
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,663Jan 23, 2025Updated last year
- Ghidra extension to disassemble NSIS installers☆24Sep 8, 2025Updated 6 months ago
- ☆1,285Apr 29, 2025Updated 10 months ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- VCAL viewer for MUTT☆16Oct 24, 2025Updated 4 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ☆15Oct 27, 2022Updated 3 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Recordization library☆11Feb 27, 2026Updated last week
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago