jduck / file-dissect
File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native feel regardless of base OS.
☆21Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for file-dissect
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆32Updated 8 months ago
- ☆26Updated 7 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Some yara rules and tools☆16Updated 10 years ago
- A collection of tools mostly written in Python.☆15Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆34Updated 9 years ago
- An evolving hacking framework written in python☆11Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20Updated 13 years ago
- See here:☆41Updated 11 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆51Updated 10 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago