education-script-projects / PyCPULinks
Central Processing Unit Information Gathering Tool
☆21Updated 5 years ago
Alternatives and similar repositories for PyCPU
Users that are interested in PyCPU are comparing it to the libraries listed below
Sorting:
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 5 years ago
- Pre-OS microcode updater☆43Updated 6 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆36Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Centralized Firewall Control☆21Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Binary reversing tool to find all possible code paths between two functions.☆27Updated 7 years ago
- Android Automation Tool☆21Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- ☆28Updated 9 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆77Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago