☆29May 4, 2021Updated 4 years ago
Alternatives and similar repositories for pingback
Users that are interested in pingback are comparing it to the libraries listed below
Sorting:
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Fuzzy search tool for IDA Pro (Update)☆12Mar 18, 2024Updated 2 years ago
- ☆23May 28, 2021Updated 4 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆26Apr 10, 2023Updated 2 years ago
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Powerful Python tool to analyze PDF documents☆26May 15, 2022Updated 3 years ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- Python script for dumping firmware from read-back protected nRF51 chips☆14Jan 17, 2018Updated 8 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binarie…☆14Sep 23, 2021Updated 4 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- Automatically exported from code.google.com/p/idapython☆20Apr 14, 2015Updated 10 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆187Apr 22, 2025Updated 10 months ago
- IDAPatternSearch adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidr…☆66Sep 14, 2021Updated 4 years ago
- ☆23May 23, 2024Updated last year
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- Deobfuscator for remove proxy calls methods☆27Jan 30, 2023Updated 3 years ago
- A collection of my presentation materials.☆17Apr 29, 2024Updated last year
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 3 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago