Python implementation of pattern_create and pattern_offset from Metasploit Framework
☆18Sep 12, 2019Updated 6 years ago
Alternatives and similar repositories for pattern
Users that are interested in pattern are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Oct 24, 2016Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆16Jul 21, 2018Updated 7 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆74Dec 9, 2019Updated 6 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 11 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆14Feb 16, 2021Updated 5 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated 2 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- rename☆19Jul 19, 2017Updated 8 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Using This 0-day to Anti-Python-Spider ..☆12Mar 6, 2018Updated 8 years ago
- A simple /dev/mem dumper for Linux☆19Aug 17, 2022Updated 3 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 收集各种各样的exp☆11Aug 20, 2015Updated 10 years ago
- Python pcap sanitizer☆22Sep 2, 2022Updated 3 years ago
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- As near as possible to bare metal☆47Jan 7, 2026Updated 3 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 11 months ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago