An Android tool to perform network analysis, port scanning, mitm attacks, etc.
☆55Feb 9, 2024Updated 2 years ago
Alternatives and similar repositories for dsploit
Users that are interested in dsploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 30, 2015Updated 10 years ago
- A symbolic execution engine for Python☆44Dec 4, 2012Updated 13 years ago
- The Ruby Programming Language☆12Nov 29, 2015Updated 10 years ago
- An old and outdated batch scripted utility for grabbing AES keys for Apple's iOS Firmware. Replaced by keygrabber.☆32Nov 24, 2012Updated 13 years ago
- ☆17Aug 4, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- PHP obfuscator written in Javascript.☆14Oct 8, 2021Updated 4 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- A tool that uses your iPhone or iPod Touch's AES engine to calculate keys/ivs for IPSW files.☆24Feb 21, 2014Updated 12 years ago
- BinSourcerer☆92Mar 1, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 11 years ago
- The set of root certificates trusted by dart:io's default SecurityContext. Taken from Mozilla's NSS library.☆12Jul 2, 2021Updated 4 years ago
- ☆20Mar 6, 2015Updated 11 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆49Mar 1, 2022Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- ☆23Feb 12, 2020Updated 6 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Power-calibrate calibrates the power consumption of a mobile device that has a battery power source. It will attempt to calculate the pow…☆13Jan 1, 2025Updated last year
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- IDAPython plugin for finding function strings recursively☆133May 17, 2022Updated 3 years ago
- GDB fork targetting Android/Fennec development☆35May 12, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 14 years ago
- port knocking by otp auth☆24Jan 28, 2026Updated 2 months ago
- An Android port of the melkor ELF fuzzer☆64Aug 21, 2014Updated 11 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago