a radare2 plugin that decodes packets with Scapy
☆34Nov 24, 2017Updated 8 years ago
Alternatives and similar repositories for r2scapy
Users that are interested in r2scapy are comparing it to the libraries listed below
Sorting:
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Dockerised Version of Frida☆21May 10, 2023Updated 2 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Jul 27, 2017Updated 8 years ago
- Practice Web App written in python with some vulnerabilities.☆34Mar 19, 2021Updated 4 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆69Apr 7, 2018Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Miscellanous scripts used for malware analysis☆23Oct 4, 2018Updated 7 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 6 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆53Dec 21, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆11Jan 27, 2026Updated last month
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Oct 18, 2019Updated 6 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 6 years ago
- ☆13Nov 1, 2017Updated 8 years ago