blackthorne / CodetectiveLinks
a tool to determine the crypto/encoding algorithm used according to traces from its representation
☆133Updated 4 years ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- File transfer via DNS☆72Updated 8 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- ☆165Updated 8 years ago
- ☆102Updated 6 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆218Updated 8 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- ☆86Updated 10 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- Python bindings for hashcat☆61Updated 5 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆100Updated 7 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆178Updated 2 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- ☆89Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- Tools for security challenges☆106Updated 2 months ago
- CANAPE Network Testing Tool☆184Updated 7 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Rogue AP killer☆90Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆50Updated 12 years ago
- Password Hash Identification☆220Updated 11 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Network based protocol fuzzer☆73Updated 3 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆160Updated 5 years ago