jduck / file-dissect
File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native feel regardless of base OS.
☆22Updated 7 months ago
Alternatives and similar repositories for file-dissect:
Users that are interested in file-dissect are comparing it to the libraries listed below
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- Why hunt when you can seine?☆21Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆35Updated 10 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- ☆27Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 10 years ago
- ☆12Updated 8 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A simple exploitable ActiveX control for RE/VR☆19Updated 10 years ago
- See here:☆42Updated 12 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- ☆24Updated 11 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆17Updated 13 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago