atxsinn3r / EyeDiffView external linksLinks
A tool to triage screenshots
☆20Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for EyeDiff
Users that are interested in EyeDiff are comparing it to the libraries listed below
Sorting:
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Jul 10, 2020Updated 5 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- (◍•﹏•) - Hi, I'm Eve☆21May 20, 2018Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104May 1, 2022Updated 3 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- A simple HTTP-Server base on Duktape☆21Jan 6, 2016Updated 10 years ago
- Extract transform load CLI tool for extracting small and middle data volume from sources (databases, csv files, xls files, gspreadsheets)…☆11Dec 17, 2025Updated last month
- Useful commands for infosec☆28Feb 13, 2023Updated 3 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Dec 4, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Make Windows LNK file with python (pylnk)☆66Jun 4, 2016Updated 9 years ago
- Xipher is a curated collection of cryptographic primitives put together to perform key/password based asymmetric encryption☆14Jan 6, 2026Updated last month
- ☆30May 23, 2017Updated 8 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- Extract Crypted Jar Archives☆78Feb 7, 2018Updated 8 years ago
- Tool used for dumping memory from Android devices☆70Jun 12, 2015Updated 10 years ago
- ☆25Apr 8, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- ☆28Nov 20, 2025Updated 2 months ago
- Analyze a large dataset containing website users data (Google Analytics data) from the Google Merchandise Store, a real ecommerce store. …☆10Oct 14, 2019Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Repository for Endpoint Security Testing☆35Jul 26, 2018Updated 7 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Feb 8, 2018Updated 8 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Oct 21, 2018Updated 7 years ago