Offline Digital Forensics Tool for Binary Files
☆38Nov 6, 2017Updated 8 years ago
Alternatives and similar repositories for ByteForce
Users that are interested in ByteForce are comparing it to the libraries listed below
Sorting:
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆94Jul 26, 2017Updated 8 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Framework to automate Bug Bounty Reconnaissance☆43Jan 4, 2021Updated 5 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago