georgenicolaou / aprocdumpView external linksLinks
Native Android software for dumping memory from Android processes
☆14Sep 18, 2014Updated 11 years ago
Alternatives and similar repositories for aprocdump
Users that are interested in aprocdump are comparing it to the libraries listed below
Sorting:
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Silensec's Nyuki Forensics Investigator (Mobile Forensics)☆45Aug 18, 2017Updated 8 years ago
- library, which help to describe or load and execute PE files.☆13Jun 23, 2013Updated 12 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 11 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- SIM Card Forensic Acquisition using USB to Serial readers☆38Sep 17, 2014Updated 11 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 10 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Bash script for checking HTTP headers for security☆17Jan 16, 2014Updated 12 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Oct 12, 2018Updated 7 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- Run one process as another under Windows☆11Jul 23, 2022Updated 3 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Two agents shooting at each other, controlled by a neural network optimized with a genetic algorithm.☆24Dec 17, 2023Updated 2 years ago
- Contains many different ways to identify hostile environments.☆63Feb 5, 2016Updated 10 years ago