blackthorne / Codetective
a tool to determine the crypto/encoding algorithm used according to traces from its representation
☆130Updated 3 years ago
Alternatives and similar repositories for Codetective:
Users that are interested in Codetective are comparing it to the libraries listed below
- Your bag of handy codes for malware researchers☆121Updated 4 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago
- ☆112Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆122Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆141Updated 4 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆114Updated 4 years ago
- ☆102Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆82Updated 4 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- ☆86Updated 9 years ago
- Rogue AP killer☆89Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆169Updated 6 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.☆158Updated 4 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Tools for security challenges☆105Updated last year
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago