Metasploit pattern generator in Python, modified to be used as a function
☆23Apr 20, 2015Updated 10 years ago
Alternatives and similar repositories for pattern_tools
Users that are interested in pattern_tools are comparing it to the libraries listed below
Sorting:
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆29Jun 17, 2015Updated 10 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- My Personal Library for CTF's☆12Apr 3, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 10 months ago
- Mini CA☆12Sep 7, 2015Updated 10 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Oct 21, 2014Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- find all "blackhole" directories with a huge amount of filesystem entries in a flat structure☆17Sep 20, 2022Updated 3 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆11Feb 10, 2013Updated 13 years ago
- Scans a system for potential credit cards for PCI DSS compliance☆16Oct 30, 2016Updated 9 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Mar 1, 2012Updated 13 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Scripts created by MRG Effitas☆42Nov 22, 2016Updated 9 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76May 21, 2024Updated last year
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago