ThomasHabets / xor-analyze
Program for cryptanalyzing xor "encryption" with variable key length
☆42Updated 15 years ago
Related projects: ⓘ
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆30Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 8 years ago
- ☆35Updated 12 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- ☆27Updated this week
- Practice and learning in the world of C RE and exploit analysis☆31Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 8 years ago
- ☆14Updated 3 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆11Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- ☆50Updated 6 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago
- ☆20Updated this week
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- A tool to download malwares☆15Updated last year
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆54Updated last year
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago