An Android tool to perform network analysis, port scanning, mitm attacks, etc.
☆55Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for dsploit
Users that are interested in dsploit are comparing it to the libraries listed below
Sorting:
- ☆14Jun 30, 2015Updated 10 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- An old and outdated batch scripted utility for grabbing AES keys for Apple's iOS Firmware. Replaced by keygrabber.☆32Nov 24, 2012Updated 13 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Actionable memory analysis for JVM languages☆17Dec 29, 2017Updated 8 years ago
- Samples showing use of DataNucleus with JPA☆12Jan 23, 2024Updated 2 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- A tool that uses your iPhone or iPod Touch's AES engine to calculate keys/ivs for IPSW files.☆24Feb 21, 2014Updated 12 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- ☆49Mar 1, 2022Updated 4 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago