Automated Password Dumper for Web Browsers
☆16Mar 23, 2014Updated 11 years ago
Alternatives and similar repositories for BrowserFreak
Users that are interested in BrowserFreak are comparing it to the libraries listed below
Sorting:
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Fast Binary Translator for the Kernel☆28Sep 23, 2013Updated 12 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Jul 2, 2020Updated 5 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- Hide JavaScript inside your GIF and BMP images☆28Aug 23, 2015Updated 10 years ago
- x64dbg Script editor v2.0☆27Oct 26, 2017Updated 8 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- PE file parser☆37Sep 13, 2015Updated 10 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Mar 5, 2014Updated 11 years ago
- Simple keylogger for Windows with HTML output and FTP upload.☆34Dec 25, 2014Updated 11 years ago
- A tool for netpens.☆37Jun 18, 2019Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago