blackthorne / CodetectiveLinks
a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation
☆135Updated 3 months ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Updated 7 years ago
- ☆166Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- ☆102Updated 6 years ago
- File transfer via DNS☆76Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 8 years ago
- CANAPE Network Testing Tool☆184Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- Some exploits and exploit development stuff.☆152Updated 3 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Get email notification when Virus Total has a copy of your binary.☆168Updated 5 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 3 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Updated 5 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Updated 9 years ago
- ☆85Updated 10 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago