A memory scanning tool which uses mach_vm* to either dump memory or look for a specific sequence of bytes.
☆94Apr 18, 2017Updated 8 years ago
Alternatives and similar repositories for MEMSCAN
Users that are interested in MEMSCAN are comparing it to the libraries listed below
Sorting:
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- DexHook is a xposed module for capturing dynamically loaded dex files.☆130Sep 14, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- A tool for enumerating the access to entries in the file system of an Android device.☆66Nov 7, 2018Updated 7 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- GDB commands to aid exploit development☆46Sep 9, 2016Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Extract *usable* file from the iOS dyld shared cache☆93Oct 18, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- This repository will only hold issues around various Tools to be bundled in AndroidTamer☆12May 2, 2016Updated 9 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- meine kleine rop compiler, circa 2012☆70Aug 16, 2021Updated 4 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- ☆38Oct 23, 2015Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- C++-based shellcode builder☆115Nov 19, 2020Updated 5 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago