Offline Digital Forensics Tool for Binary Files
☆38Nov 6, 2017Updated 8 years ago
Alternatives and similar repositories for ByteForce
Users that are interested in ByteForce are comparing it to the libraries listed below
Sorting:
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Digital Forensics date and time☆23Dec 22, 2025Updated 2 months ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Jan 14, 2019Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Process heap analysis framework - Windows/Linux - record type inference and forensics☆95Jul 26, 2017Updated 8 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Yara filetype plugin for Vim.☆14Feb 18, 2021Updated 5 years ago
- 😈 The Demon App Store☆30Aug 18, 2021Updated 4 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆82Mar 9, 2017Updated 9 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Python Digital Forensics [video], published by Packt☆21Jan 30, 2023Updated 3 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- documentation, scripts, tools related to Zena Forensics (http://blog.digital-forensics.it)☆101Apr 21, 2017Updated 8 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Demon Pentest Shell☆15Aug 4, 2021Updated 4 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago