jbremer / jsunpckLinks
Javascript Unpacker and Simplifier
β41Updated 7 years ago
Alternatives and similar repositories for jsunpck
Users that are interested in jsunpck are comparing it to the libraries listed below
Sorting:
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)β13Updated 8 years ago
- Some exploits for ZeroNights 0x03β36Updated 10 years ago
- Truehunterβ30Updated 4 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)β10Updated 9 years ago
- β16Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolβ26Updated 8 years ago
- Recursively searches a directory for any file containing a specified stringβ48Updated 10 years ago
- Vulnerability Reports by Aleph Researchβ35Updated last year
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive argumentsβ33Updated 3 years ago
- unbox - Unpack and Decompile the $h*! out of thingsβ47Updated 7 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packagesβ13Updated 3 years ago
- r2yara - Module for Yara using radare2 informationβ35Updated 2 years ago
- scripts, etc...β37Updated last year
- KIMS Multi AV Scanner by DSR!β31Updated 5 years ago
- Searches for interesting cached DNS entries.β55Updated 11 years ago
- Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.β95Updated 4 years ago
- A short and small memory forensics helper.β53Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.β16Updated 11 years ago
- OS Fingerprint Obfuscation for modern Linux Kernelsβ77Updated last year
- Some NSE scripts to search information from routersβ35Updated 10 years ago
- An ELF parasite command injector.β34Updated 8 years ago
- Dockerised Version of Fridaβ21Updated 2 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocolβ¦β31Updated 12 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.β38Updated 8 years ago
- A python script for obfuscating wireless networksβ79Updated 9 years ago
- Proof-of-concept malware programs. For educational purpose only.β23Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan APIβ29Updated 10 years ago
- Man in the Middle SOCKS Proxy for JAVAβ37Updated 12 years ago
- β65Updated 9 years ago
- Python Application to Reverse Freezingβ36Updated 9 years ago