ActionScript ByteCode Disassembler
☆16Oct 20, 2015Updated 10 years ago
Alternatives and similar repositories for abcd
Users that are interested in abcd are comparing it to the libraries listed below
Sorting:
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Admin Panel Finder☆38Sep 22, 2025Updated 5 months ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ☆91Apr 16, 2017Updated 8 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆13Jul 10, 2022Updated 3 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Jan 27, 2017Updated 9 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Sep 20, 2011Updated 14 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- Universal disassembler for Python bytecode (supports Python 2 and 3)☆52Oct 18, 2011Updated 14 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- ☆22Jul 28, 2019Updated 6 years ago
- ☆95Jul 4, 2018Updated 7 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- ctf101 systems security repository☆26Jul 19, 2021Updated 4 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- giskismet – Wireless recon visualization tool☆55Aug 26, 2016Updated 9 years ago
- اداه فك تشفير ادوات بايثون☆10May 27, 2024Updated last year
- My personal Automated Malware Analysis Sandboxes and Services☆24Mar 26, 2017Updated 8 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- Multi-threaded SSH Password Auditor☆93Feb 4, 2014Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆27Mar 1, 2017Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- MXET-300 Mobile Robotics Class utilizing the SCUTTLE Platform☆13Jun 16, 2025Updated 8 months ago