blackthorne / CodetectiveLinks
a tool to determine the crypto/encoding algorithm used according to traces from its representation
☆132Updated 4 years ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- File transfer via DNS☆73Updated 8 years ago
- CANAPE Network Testing Tool☆184Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆100Updated 7 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- ☆102Updated 5 years ago
- ☆113Updated 8 years ago
- ☆165Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 5 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago
- POLAR☆73Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Rogue AP killer☆90Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆217Updated 8 years ago
- Wolves Among the Sheep☆147Updated last year
- ☆89Updated 7 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- ☆86Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago