Hide JavaScript inside your GIF and BMP images
☆28Aug 23, 2015Updated 10 years ago
Alternatives and similar repositories for ImageExploiter
Users that are interested in ImageExploiter are comparing it to the libraries listed below
Sorting:
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Automated Password Dumper for Web Browsers☆16Mar 23, 2014Updated 11 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- ☆19Mar 20, 2014Updated 11 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- CAPE monitor DLLs☆42Dec 3, 2019Updated 6 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Aug 14, 2015Updated 10 years ago
- 自己ctf比赛的writeup☆19May 27, 2019Updated 6 years ago
- Program for my "A TCP Proxy in Perl" article☆25Apr 30, 2016Updated 9 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated last month
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Binaryninja AVR architecture plugin with lifting☆45Oct 26, 2023Updated 2 years ago
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- hid emulation tools for the usbarmory☆67Dec 12, 2016Updated 9 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Oct 9, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- NrvrCommander is a Python package for devops and QA automation around virtual machines, VMware, Linux, and more.☆16Dec 8, 2015Updated 10 years ago
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Sep 26, 2018Updated 7 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- x64dbg Script editor v2.0☆27Oct 26, 2017Updated 8 years ago
- ☆24Nov 10, 2015Updated 10 years ago
- An API for consuming all the memory of Java apps using deserialization☆28Jan 10, 2016Updated 10 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- ☆28Feb 13, 2017Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago