WojciechMula / locatedb
Python lib/prog to manipulate locatedb files
☆14Updated 10 years ago
Alternatives and similar repositories for locatedb:
Users that are interested in locatedb are comparing it to the libraries listed below
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Simple network sandbox for Unix and Windows☆20Updated 6 years ago
- Experimental CPU-bound (soon GPU) vanity onion address generator. Moved to https://gitlab.com/dphillips/sand-leek☆11Updated 4 years ago
- The Email Privacy Tester☆92Updated 8 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 9 years ago
- ☆17Updated 7 years ago
- Source code for the beta release of CobraDroid☆14Updated 4 years ago
- runtime code injector for Linux☆27Updated 13 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- A Python command line argument to object parsing library for command line application development☆14Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- A tool for automated MITM attacks on SSL connections.☆22Updated 12 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆16Updated 2 months ago
- IRMA frontend☆25Updated 8 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- python inspect rootkit tool☆34Updated 11 years ago
- ☆24Updated 9 years ago
- ☆13Updated 5 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 8 years ago
- ☆12Updated 7 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- RESTful interface to your operating system shell☆19Updated 7 years ago