Scanner for Regin Virtual Filesystems
☆25Jan 20, 2015Updated 11 years ago
Alternatives and similar repositories for ReginScanner
Users that are interested in ReginScanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Windows Syslog Command Line Client☆16Nov 21, 2012Updated 13 years ago
- Small and cheap standalone USB sanitizer☆44Mar 5, 2021Updated 5 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated 2 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Wordpress Watcher is a wrapper for WPScan that manages scans on multiple sites and reports by email☆11Jun 23, 2020Updated 5 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- ☆52Apr 14, 2015Updated 11 years ago
- ☆12Apr 13, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated last year
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- ☆108Jul 18, 2017Updated 8 years ago
- Currency Recognition On Mobile Phones☆13Jun 15, 2024Updated last year
- Random tools and things for creating+injecting complex organisms into a process on both the posix and windows platforms. Includes support…☆42Apr 14, 2026Updated last month
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Mar 22, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Install your remote server for the Lamassu Cryptomat☆19Mar 30, 2026Updated last month
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆26Jun 8, 2013Updated 12 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 9 years ago
- Check Diffie Hellman group prime parameter☆11Jan 29, 2016Updated 10 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 10 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 10 years ago
- Yara rules for malware families seen as part of targeted threats project☆142Nov 17, 2016Updated 9 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- The Demo for CVE-2018-1000006☆39Jan 25, 2018Updated 8 years ago