☆16May 22, 2015Updated 10 years ago
Alternatives and similar repositories for phoneyc
Users that are interested in phoneyc are comparing it to the libraries listed below
Sorting:
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Binary Ninja plugin for ROP gadget calculation☆28Jul 6, 2019Updated 6 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- ☆38May 31, 2017Updated 8 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- A Libemu Cython wrapper☆129Nov 29, 2023Updated 2 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- ☆14Oct 29, 2020Updated 5 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- post-exploitation network mapper☆25Jul 6, 2016Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- ☆13Dec 16, 2022Updated 3 years ago
- Parsing UDP in Elixir with Binary Pattern Matching☆18Jun 5, 2020Updated 5 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- An Incident Response tool to extract console command history and screen output buffer☆42Jan 11, 2018Updated 8 years ago
- A Python module that enables the automation of Firefox☆33Feb 18, 2026Updated last month
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- ☆28Oct 30, 2016Updated 9 years ago