Scanner for Regin Virtual Filesystems
☆25Jan 20, 2015Updated 11 years ago
Alternatives and similar repositories for ReginScanner
Users that are interested in ReginScanner are comparing it to the libraries listed below
Sorting:
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆12Mar 20, 2024Updated last year
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email☆11Jun 23, 2020Updated 5 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- ☆108Jul 18, 2017Updated 8 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A tool for analyzing code coverage and path coverage without using xdebug.☆23Sep 13, 2012Updated 13 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- x64dbg Script editor v2.0☆27Oct 26, 2017Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- WebShell Collect☆14Dec 7, 2015Updated 10 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Scan for LLTD-enabled hosts on your network☆24Mar 8, 2021Updated 4 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Random tools and things for creating+injecting complex organisms into a process on both the posix and windows platforms. Includes support…☆42Updated this week
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- ☆16Aug 11, 2017Updated 8 years ago