Static file analysis for PE files
☆13Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for pe-static
Users that are interested in pe-static are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- reportlab 用户手册提取版,并参照过后,整理的中文版。☆35Feb 22, 2023Updated 3 years ago
- Balloon Hashing implemented in Python☆17Nov 21, 2025Updated 4 months ago
- Website searcher for SEO comparisons / OSINT☆11Oct 13, 2019Updated 6 years ago
- Docker image for accessing EDavki☆14Feb 4, 2019Updated 7 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- log4j2 rce漏洞扫描器☆11Mar 2, 2024Updated 2 years ago
- ☆11Jan 24, 2019Updated 7 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Simple and short implementation of a Snake game. Any pull requests which make it shorter or cleaner would be greatly appreciated : ).☆41Aug 7, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- Deletes a file that is currently in use by another process.☆13Oct 12, 2021Updated 4 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- blender scripts for shapenet☆11Oct 12, 2020Updated 5 years ago
- A music generator that makes pleasing music based on western music theory☆12Jul 19, 2017Updated 8 years ago
- A Python interface for automating Ghidra tasks.☆11Jun 17, 2024Updated last year
- ☆16Mar 19, 2026Updated last week
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 10 months ago
- Reload Haskell IDE☆18Mar 11, 2017Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Haskell generic interface (type classes) for cryptographic algorithms☆29Jun 16, 2017Updated 8 years ago
- Automated testing of SMTP servers for penetration testing☆14Oct 23, 2025Updated 5 months ago
- Automatically exported from code.google.com/p/libdasm☆30Apr 15, 2020Updated 5 years ago
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- LIGHTER-R is a tool to optimally implement a given 4 × 4 SBox using logic gates from a reversible logic library☆13Oct 6, 2025Updated 5 months ago
- service location protocol amplified denial of service attack verification tool☆16Apr 25, 2023Updated 2 years ago
- A tiny set of helper scripts for ipinfo☆17Aug 7, 2020Updated 5 years ago
- Code for FSE 2020 - Improving the MILP-based Security Evaluation Algorithm against Differential-Linear Cryptanalysis Using A Divide-and-C…☆16Dec 16, 2019Updated 6 years ago
- Standalone Java reference implementation of Diffie Hellman☆22Sep 7, 2016Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆13Feb 24, 2020Updated 6 years ago
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- An attempt to port lossyWAV to POSIX.☆17May 21, 2024Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago