Xyl2k / bLaCk-eye-RSA-Attacking-Toolkit-v0.1f-compiledView external linksLinks
The great RSA Attacking Toolkit compiled for Windows
☆18Jan 20, 2016Updated 10 years ago
Alternatives and similar repositories for bLaCk-eye-RSA-Attacking-Toolkit-v0.1f-compiled
Users that are interested in bLaCk-eye-RSA-Attacking-Toolkit-v0.1f-compiled are comparing it to the libraries listed below
Sorting:
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Python script to parse PE header information☆17Dec 26, 2019Updated 6 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆19Sep 19, 2018Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Some tools for EFI hackery☆41Feb 25, 2012Updated 13 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Eagle schematics☆45Mar 22, 2016Updated 9 years ago
- ☆16Apr 11, 2017Updated 8 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 3 weeks ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Jun 22, 2015Updated 10 years ago
- Fake msxfs.dll to debug ATM trojans☆55Sep 28, 2015Updated 10 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 10 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago