anthonykasza / DOM-CompareLinks
Simple script for comparing HTML DOM trees using Zhang Shasha algorithm
☆9Updated 5 years ago
Alternatives and similar repositories for DOM-Compare
Users that are interested in DOM-Compare are comparing it to the libraries listed below
Sorting:
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- Data package with attacks against civil society☆13Updated 9 years ago
- recon framework in ruby☆13Updated 13 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Alternative hexdump.☆15Updated 9 years ago
- Graphical analysis of PDF structure.☆12Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- A tool to download malwares☆16Updated 2 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 7 months ago
- Virus names generator☆28Updated 10 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Updated 9 years ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 11 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- ☆24Updated 9 years ago