blackthorne / CodetectiveLinks
a tool to identify cryptographic hashes, encodings, and other artifacts in a byte stream according to traces of its representation
☆135Updated 2 months ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 5 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- POLAR☆74Updated 6 years ago
- CANAPE Network Testing Tool☆184Updated 7 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- ☆102Updated 6 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Updated 9 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 4 years ago
- Some exploits and exploit development stuff.☆150Updated 3 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Tools for security challenges☆106Updated 2 months ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- ☆84Updated 10 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- File transfer via DNS☆75Updated 8 years ago
- ☆165Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Python bindings for hashcat☆63Updated 6 years ago
- ☆111Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago