my little bucket to store the delusions of grandeur I write in python :D
☆30Oct 16, 2014Updated 11 years ago
Alternatives and similar repositories for Eagleeye
Users that are interested in Eagleeye are comparing it to the libraries listed below
Sorting:
- A different take on Viss's eagleeye project, optimized for use in clouds☆33Apr 19, 2013Updated 12 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- password cracking front end☆58Mar 17, 2020Updated 5 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- 🎻 Tools for Hackers, Forensic Analysts, Penetration Testers and Security Engineers.☆32Jul 15, 2017Updated 8 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 4 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- ☆28Nov 20, 2025Updated 3 months ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- GNTL Project Documentation☆11Apr 9, 2021Updated 4 years ago
- A library and tool for querying, executing and exporting TR-064 devices and services☆10Apr 4, 2018Updated 7 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- XELIS documentation website☆11Feb 26, 2026Updated last week
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Jun 30, 2015Updated 10 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Unofficial mirror of haproxy-1.5 repository☆12Mar 25, 2016Updated 9 years ago
- A CAPTCHA recognition demo in tensorflow.☆11Jun 13, 2017Updated 8 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Hello World sample app with Ruby, Sinatra and DataMapper☆10Jan 19, 2023Updated 3 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago