angusshire / memscanLinks
CLI utility for scanning user-mode process memory.
☆130Updated 7 years ago
Alternatives and similar repositories for memscan
Users that are interested in memscan are comparing it to the libraries listed below
Sorting:
- Script for spoofing network adapter's MAC address on Windows.☆182Updated 9 years ago
- Solutions to bioinformatics problems.☆27Updated 9 years ago
- Pure Python database management system☆97Updated 8 years ago
- C/C++ to assembly visualizer☆385Updated 4 years ago
- git cheat sheets in your command line☆217Updated 7 years ago
- ASM Malicious code - PE infector☆72Updated 8 years ago
- Speed you SHA. A different hash style.☆13Updated 9 years ago
- C-Library for unit testing.☆19Updated 3 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆393Updated 10 years ago
- A clone of LogicHex using Javascript canvas.☆45Updated 6 years ago
- Linux and C programming in a web browser☆26Updated 8 years ago
- vm for a dynamically typed language☆35Updated 8 years ago
- a simple imperative language☆48Updated 9 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Twitter bots, IRC bots, bots that make other bots. The world of bots is limitless.☆19Updated 8 years ago
- Superfast Line Counter☆51Updated 4 years ago
- Even better than eda-reversing...I hope☆62Updated 15 years ago
- A multi-threading tool to sniff TCP flow statistics and embedded HTTP headers from PCAP file. Each TCP flow carrying HTTP is exported to …☆190Updated 2 months ago
- Fake SSH server for confusing spammers, because we all know security through obscurity rocks.☆44Updated 8 years ago
- the code that powers Wikicoding, the wikipedia of code.☆11Updated 8 years ago
- Reverse proxy for HTTPS services, with SSL verification.☆60Updated 2 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Windows System Treasure☆76Updated 8 years ago
- Give the NSA free backdoor access to your Flask app.☆186Updated 12 years ago
- A website to explain how computers actually work.☆273Updated 4 years ago
- A debugger frontend☆141Updated 9 years ago
- Hohha Dynamic XOR Encryption Algorithm☆54Updated 5 years ago
- A *nix shell implemented in assembly - because why not?☆12Updated 9 years ago
- ☆15Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 4 months ago