☆29May 4, 2021Updated 4 years ago
Alternatives and similar repositories for pingback
Users that are interested in pingback are comparing it to the libraries listed below
Sorting:
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Fuzzy search tool for IDA Pro (Update)☆12Mar 18, 2024Updated last year
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binarie…☆14Sep 23, 2021Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- Simple REST-style web service for the CVE searching☆97May 19, 2023Updated 2 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆17Feb 25, 2025Updated last year
- ☆25Sep 25, 2024Updated last year
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Automatically exported from code.google.com/p/idapython☆20Apr 14, 2015Updated 10 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Useful library for validation of Bitcoin, Litecoin, Ethereum and other cryptocoin addresses☆20Aug 3, 2024Updated last year
- ☆26Apr 10, 2023Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- ☆23May 28, 2021Updated 4 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Static Obfuscar Deobfuscator☆22Aug 31, 2019Updated 6 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- A (basic) Mach-O Library☆23Sep 13, 2021Updated 4 years ago
- Deobfuscator for remove proxy calls methods☆28Jan 30, 2023Updated 3 years ago
- Set of CLI tools to transform ModSecurity logs into a meaningful information, given a context.☆52May 5, 2023Updated 2 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 2 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago