☆23Apr 10, 2016Updated 9 years ago
Alternatives and similar repositories for peda_cheatsheet
Users that are interested in peda_cheatsheet are comparing it to the libraries listed below
Sorting:
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- ☆13Jul 15, 2021Updated 4 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆86Jul 12, 2023Updated 2 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- ☆13Mar 28, 2024Updated last year
- Basic tool to automate backdooring PE files☆56Feb 24, 2022Updated 4 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆53Apr 27, 2024Updated last year
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- ☆15May 6, 2021Updated 4 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆16Jan 14, 2026Updated last month
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- LibML is a library for loading, configuring, and running machine learning models in production. It provides a simple high-level API for C…☆13Mar 14, 2025Updated 11 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- PinterCoding University. Author : Gun Gun Febrianza☆11Jun 27, 2020Updated 5 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- 3D (Stereoscopic) Camera streamer using two Raspberry Pi Zeros and two Pi Cameras in a ProtoStax Enclosure☆10Jan 9, 2025Updated last year
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago