everything that does not fit elsewhere
☆12Dec 27, 2017Updated 8 years ago
Alternatives and similar repositories for stuff
Users that are interested in stuff are comparing it to the libraries listed below
Sorting:
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Third party libraries designed to be compatible the pic32, and chipKit☆12Oct 17, 2017Updated 8 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Linux 802.11 channel hopping utility.☆21Mar 4, 2018Updated 8 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- The Secure Block Device Library is a software library that applies cryptographic confidentiality and integrity protection, including data…☆36Jan 16, 2018Updated 8 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Yara intergrated into BurpSuite☆48Jun 30, 2016Updated 9 years ago
- PoC of CVE-2019-15126 kr00k vulnerability☆12Mar 19, 2020Updated 6 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Assembler and disassembler for compiled Python☆21Dec 12, 2020Updated 5 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Injecting failures into BGP.☆10Dec 6, 2015Updated 10 years ago
- Replay HAR logs☆13Apr 14, 2015Updated 10 years ago
- Get chrome passwords from chrome database in powershell☆33Apr 5, 2019Updated 6 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- ☆14May 20, 2020Updated 5 years ago
- TiLDA Badge Version 3 - Hardware☆18Jan 22, 2017Updated 9 years ago
- This is a list of scripts I created while formerly working at Drexel University. These scripts were released with permission.☆16Oct 18, 2020Updated 5 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 9 years ago
- A crude DNS proxy☆25Jun 25, 2025Updated 8 months ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- first commit☆23Feb 16, 2026Updated last month
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Feb 10, 2017Updated 9 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- JumpBox – A Seamless Browser Proxy for Tor Pluggable Transports☆15Jan 12, 2015Updated 11 years ago
- 按主题显示浏览历史, 支持关键词搜索☆11Feb 3, 2021Updated 5 years ago
- ☆28Nov 9, 2020Updated 5 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Dec 16, 2020Updated 5 years ago
- Simple bash script to enumerate Linux machines☆13Nov 5, 2018Updated 7 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago