Static-Code-Analysis-Helper helps you perform static code analysis.
☆32Feb 20, 2026Updated 2 months ago
Alternatives and similar repositories for static-code-analysis-helper
Users that are interested in static-code-analysis-helper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year
- Encodes a message using emojis based on a specified pattern.☆17Feb 26, 2024Updated 2 years ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- A polyglot static analysis engine for detecting vulnerabilities in scripting languages native extensions based on joern.☆21Sep 1, 2025Updated 8 months ago
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Rust library implementing the Toorani-Beheshti signcryption scheme☆13Aug 15, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated last year
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 4 months ago
- AutoAR is an automated security reconnaissance tool, ASM and Discord bot for bug bounty hunters and penetration testers. It automates gat…☆188Updated this week
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 7 months ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Just "Harmless" Google dorks for bug hunters☆23Nov 25, 2024Updated last year
- dEX is a powerful tool for transmitting OS command output over DNS. It is equipped with robust mechanisms for handling missing chunks, en…☆18Nov 21, 2024Updated last year
- ☆17Feb 15, 2025Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- IDA's Lumina feature, reimplemented for Ghidra☆24May 24, 2023Updated 2 years ago
- Home of https://redteam.guide☆15Apr 1, 2026Updated last month
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆86Apr 19, 2026Updated last week
- ☆21Aug 7, 2021Updated 4 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Easy-to-use, Drag-and-Drop, Microsoft PDB file downloader for Windows Executables.☆22Oct 13, 2020Updated 5 years ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆40Jul 28, 2025Updated 9 months ago
- Advanced mobile security research platform for authorized testing and educational purposes☆45Oct 4, 2025Updated 6 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆116Nov 17, 2025Updated 5 months ago
- 遇到过 的弱口令☆10Nov 21, 2023Updated 2 years ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 10 months ago
- The Mail Server Checker is a PHP new tool designed to analyze and verify the different protocols (SPF, DMARC, DKIM) releated to the domai…☆17Feb 8, 2025Updated last year
- Access radare2 from anywhere, anytime.☆45Apr 14, 2026Updated 2 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆46Apr 20, 2026Updated last week
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 10 months ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- PE .exe packer and manual loader for Windows with compression, encryption, and much more☆56Sep 5, 2025Updated 7 months ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated last year