Solutions to crackmes
☆19May 22, 2015Updated 10 years ago
Alternatives and similar repositories for crackmes
Users that are interested in crackmes are comparing it to the libraries listed below
Sorting:
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- A PE Header-Based Antivirus Tool☆11Nov 14, 2014Updated 11 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Python regex generator (list of strings => Regex)☆12Jun 21, 2022Updated 3 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- G-Presto Anti-Cheat Reverse Engineered.☆26Jun 8, 2022Updated 3 years ago
- ☆17Jun 3, 2025Updated 9 months ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Apr 5, 2024Updated last year
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- A simple python packet sniffer and manipulation tool for linux☆18Nov 26, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- YAFFS extractor☆55Aug 30, 2024Updated last year
- ☆24Jul 6, 2015Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago