☆166Apr 25, 2017Updated 9 years ago
Alternatives and similar repositories for Py2ExeDecompiler
Users that are interested in Py2ExeDecompiler are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Translator from asm to C, but not decompiler. Something between compiler and decompiler.☆56Aug 31, 2021Updated 4 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆296Sep 30, 2023Updated 2 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆91Aug 22, 2016Updated 9 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆534Jul 2, 2025Updated 10 months ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆995Feb 10, 2019Updated 7 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Fileless web browser information extraction☆221Apr 23, 2018Updated 8 years ago
- Upgrade your netcat shell today!☆58Jul 11, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 6 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆37Jan 8, 2017Updated 9 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago
- A Reverse Engineering Tool for py2exe applications.☆210May 21, 2017Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Sep 13, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- Teaching old shellcode new tricks☆210Aug 1, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- windows syscall table from xp ~ 10 rs4☆356Jun 8, 2018Updated 7 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago