jduck / file-dissect
File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native feel regardless of base OS.
☆22Updated 8 months ago
Alternatives and similar repositories for file-dissect
Users that are interested in file-dissect are comparing it to the libraries listed below
Sorting:
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆35Updated 10 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Tool support and visualizaton of Assembly Language within Eclipse, and integrated with IDA Pro. Can also be used as a standalone executab…☆14Updated 10 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 15 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- See here:☆42Updated 12 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- A configurable XPath/XML injection testbed☆33Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Little Ida pro gimmick, to use pip from python.☆10Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- recon framework in ruby☆13Updated 13 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆16Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Search pastebin for keywords using python☆33Updated 13 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Why hunt when you can seine?☆21Updated 10 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago