Powerful Python tool to analyze PDF documents
☆26May 15, 2022Updated 3 years ago
Alternatives and similar repositories for peepdf
Users that are interested in peepdf are comparing it to the libraries listed below
Sorting:
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- mult-answer plugin for CTFd☆15Aug 22, 2019Updated 6 years ago
- Windows Event Log Knowledge Base☆31Dec 23, 2025Updated 2 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 3 years ago
- Similar to *script* without replay but with a mechanism to inject keytrokes in the slave's keyboard queue☆17Aug 1, 2021Updated 4 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- a CI-ready shell language syntax checker☆24Mar 12, 2026Updated last week
- Orthos is a machine administration tool.☆19Mar 12, 2026Updated last week
- The most relaxed testing framework of Kubernetes in the world☆15Nov 26, 2019Updated 6 years ago
- ☆20Sep 23, 2018Updated 7 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- Portable Windows DLL stub generator. Currently supports Windows and Linux.☆15May 29, 2017Updated 8 years ago
- Using Spotify Playlists as Malware CDN☆26Feb 1, 2021Updated 5 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- A yara based MCP Server☆23Updated this week
- Artifacts from the DARPA-funded SafeDocs research program☆27May 25, 2023Updated 2 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- pomfload - upload to pomf from the comfort of your command line☆17Jun 10, 2016Updated 9 years ago
- Lazy Hacker Editor. Because nothing beats the eficiency of writing code already written. This is that kind of editor. Just for real hacke…☆10Dec 28, 2024Updated last year
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- How to run, debug, and unit test ARM code on X86 ubuntu☆40Sep 29, 2021Updated 4 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- A spotty theme (light and dark) for Obsidian☆14Feb 28, 2024Updated 2 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Package URL implementation for Rust☆14Dec 8, 2025Updated 3 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- GitHub Action for the Packer CLI☆12Mar 13, 2026Updated last week
- ☆17Mar 6, 2023Updated 3 years ago
- Threat Hunting at Scale: Auditing Thousands of Clusters With Falco + Fluent☆12Aug 13, 2022Updated 3 years ago
- A caching forward proxy.☆13Feb 11, 2026Updated last month
- ☆12Dec 29, 2025Updated 2 months ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago