joswr1ght / plistsubtractorLinks
Read a plist file, write out any embedded plist files
☆35Updated 10 years ago
Alternatives and similar repositories for plistsubtractor
Users that are interested in plistsubtractor are comparing it to the libraries listed below
Sorting:
- incident response tool for iOS devices☆49Updated 3 years ago
- Mobile Incident Response Book☆61Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆57Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- URLCrazy☆31Updated 12 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Development guide for Volatility Plugins☆22Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- ☆61Updated 7 years ago
- Differential Analysis of Malware in Memory☆215Updated 8 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- Process HTTP Pcaps With YARA☆108Updated 12 years ago
- VOIP Security Audit Framework☆109Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 11 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- ☆50Updated 9 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- PoC implementation of the POODLE attack☆69Updated 10 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago