Extract the opcode from the objdump of a binary
☆13Dec 28, 2015Updated 10 years ago
Alternatives and similar repositories for bin2op
Users that are interested in bin2op are comparing it to the libraries listed below
Sorting:
- Malicious PowerShell Dataset☆24Aug 8, 2023Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Aug 20, 2024Updated last year
- https://academy.tcm-sec.com/☆14Aug 19, 2025Updated 6 months ago
- ☆10Feb 5, 2026Updated 3 weeks ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆11Apr 1, 2021Updated 4 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Spring AI for Baidu Qianfan☆15Jun 6, 2025Updated 8 months ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Sep 20, 2023Updated 2 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- LaukvikCSV is a powerful API for reading, writing and querying tabular data stored in the CSV format. In contrast to other API it lets yo…☆10Feb 25, 2022Updated 4 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- 使用Java基于Netty+Socks5+TLS实现的代理服务☆12Oct 29, 2021Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Python tool to parse and decrypt files quarantined by windows defender☆13Feb 25, 2023Updated 3 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- A python script to automatically generate shellcode payload from assembly files.☆13Nov 13, 2022Updated 3 years ago
- Pop Os dotfiles☆10Mar 18, 2023Updated 2 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 9 months ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- SOCKS 6 proxy and proxifier (under heavy development)☆11Feb 7, 2020Updated 6 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- Collection of mods for Total War: Warhammer III☆13Aug 25, 2022Updated 3 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago