Python implementation of pattern_create and pattern_offset from Metasploit Framework
☆18Sep 12, 2019Updated 6 years ago
Alternatives and similar repositories for pattern
Users that are interested in pattern are comparing it to the libraries listed below
Sorting:
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Dec 9, 2019Updated 6 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- A simple /dev/mem dumper for Linux☆19Aug 17, 2022Updated 3 years ago
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- A utility to dump memory of unixy processes☆18Apr 5, 2022Updated 3 years ago
- ☆24Mar 30, 2021Updated 4 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- As near as possible to bare metal☆48Jan 7, 2026Updated last month
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- Create your own Bitwig modulator using the Nitro DSP language☆24May 26, 2017Updated 8 years ago
- Socket programming tutorials in C, python, perl, java, winsock☆30Jun 26, 2013Updated 12 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Feb 13, 2015Updated 11 years ago
- A library to bring the joys of non-systemd users to systemd users☆27Oct 31, 2017Updated 8 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Add audio to Web images☆50Sep 9, 2013Updated 12 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Have fun!☆31Nov 5, 2017Updated 8 years ago
- A simple Makefile for C executables and static libraries☆28Jul 27, 2024Updated last year
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- Smemstat reports the physical memory usage taking into consideration shared memory. The tool can either report a current snapshot of memo…☆34Jan 1, 2025Updated last year