carmaa / interrogate
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
☆79Updated 5 years ago
Alternatives and similar repositories for interrogate:
Users that are interested in interrogate are comparing it to the libraries listed below
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- ☆15Updated 8 years ago
- Spy Agency Teasing☆14Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Basic file metadata gathering script☆21Updated 3 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆27Updated 5 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- See here:☆42Updated 12 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Encase Script to parse harddrive for MFT data☆16Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Utility to decompress Linux swsusp hibernation file.☆27Updated 3 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- post-exploitation tools☆15Updated 7 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago