blackthorne / CodetectiveLinks
a tool to determine the crypto/encoding algorithm used according to traces from its representation
☆132Updated 3 years ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆98Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- HTTP Header Analysis Vulnerability Tool☆114Updated 4 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆165Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Patch pyc files with your code. Fairly lame.☆68Updated 9 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆84Updated 3 years ago
- CANAPE Network Testing Tool☆184Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- ☆113Updated 8 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Cross Platform Malware Development Framework☆68Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago