jdukes / hackercodecs
A set of codecs for python that are useful to have for CTF or general hacking.
☆35Updated 6 years ago
Alternatives and similar repositories for hackercodecs:
Users that are interested in hackercodecs are comparing it to the libraries listed below
- ☆27Updated 7 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- ☆45Updated 7 years ago
- Memory awesomeness.☆29Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- swffile.py - SWF file parser module in Python☆28Updated 8 years ago
- python based backdoor software☆17Updated 13 years ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Canari local transforms pcap file analysis☆31Updated 10 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Updated 2 months ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Python object interface to requests/responses recorded by Burp Suite☆36Updated 5 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- A multi-codec media fuzzing tool.☆42Updated 12 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago