blackthorne / CodetectiveLinks
a tool to determine the crypto/encoding algorithm used according to traces from its representation
☆135Updated 4 years ago
Alternatives and similar repositories for Codetective
Users that are interested in Codetective are comparing it to the libraries listed below
Sorting:
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- ☆165Updated 8 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- ☆102Updated 6 years ago
- File transfer via DNS☆73Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Tools for security challenges☆106Updated 3 weeks ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Some exploits and exploit development stuff.☆150Updated 3 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Small tool for disassembling shellcode (using objdump)☆149Updated 3 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 9 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆179Updated 2 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆177Updated 5 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Updated 5 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago