ActiveMime File Format Documentation
☆19Jun 28, 2021Updated 4 years ago
Alternatives and similar repositories for activemime-format
Users that are interested in activemime-format are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- Compressed Rich Text Format (RTF) compression and decompression in Python☆24Jun 29, 2025Updated 9 months ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- because twin clams are better than one clam?☆29Mar 30, 2026Updated last week
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆12May 6, 2020Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Dec 11, 2023Updated 2 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- ☆12Feb 1, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Run strongr-frida-server on boot with Magisk☆14Oct 12, 2024Updated last year
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated last month
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Digital Forensics date and time☆23Updated this week
- Tools☆13Apr 20, 2023Updated 2 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆19Jul 2, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- Files used for various testing methodologies.☆12Apr 1, 2026Updated last week
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- CVE-2018-8174 - VBScript memory corruption exploit.☆169May 23, 2018Updated 7 years ago
- ☆42Jul 23, 2018Updated 7 years ago