Scripts created by MRG Effitas
☆42Nov 22, 2016Updated 9 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- ☆27Mar 1, 2022Updated 3 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆12Dec 25, 2019Updated 6 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- A set of tools which solves the coin change problem to generate ROP payloads☆18Aug 18, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Mass Triage Tools☆20Dec 16, 2025Updated 2 months ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 2 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago