blackthorne / CodetectiveLinks
a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation
☆135Updated last month
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆172Updated 7 years ago
- File transfer via DNS☆74Updated 8 years ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- A shellcode testing harness.☆70Updated last year
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- ☆165Updated 8 years ago
- ☆102Updated 6 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆222Updated 8 years ago
- POLAR☆74Updated 6 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 4 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- Tools for security challenges☆106Updated 2 months ago
- Rogue AP killer☆92Updated 7 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Some exploits and exploit development stuff.☆150Updated 3 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- ☆85Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆171Updated 3 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆202Updated 9 years ago