jweyrich / imgify
πΌ imgify - Convert any file to PNG and back.
β14Updated 6 months ago
Related projects: β
- Automatic generator of YARA modules based in protocol buffersβ14Updated last week
- Network based steganography based control channels and chat.β8Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashingβ20Updated 4 years ago
- Golang port for Metasploit's pattern_create and pattern_offsetβ12Updated 3 years ago
- PoC of injecting code into a running Linux processβ23Updated 5 years ago
- #οΈβ£ πΈοΈ π€ HTTP Headers Hashingβ14Updated last year
- Shell utility to list colorfully show what processes are listening on what ports.β19Updated 5 years ago
- Extract, defang, resolve names and IPs from textβ22Updated 8 months ago
- smtp-user-enum.pl ported into a recon-ng module.β9Updated 10 years ago
- Linux and Windows Hardening Pointsβ12Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.β30Updated 6 years ago
- Python library for image hashing and deduplicationβ11Updated 8 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis systemβ17Updated 3 years ago
- The Multiplatform Linux Sandboxβ15Updated 9 months ago
- iknowthis Linux SystemCall Fuzzerβ20Updated 5 years ago
- Decryption utility for PGP Whole Disk Encryptionβ18Updated 3 years ago
- β32Updated this week
- AppSecurityLimits - Allows Executables To Define Security Limitsβ16Updated 5 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to reβ¦β12Updated 8 years ago
- module for certexfilβ15Updated 2 years ago
- β10Updated this week
- Windows SSPI wrapper in prue pythonβ15Updated 9 months ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.β13Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.β23Updated 6 years ago
- Malware campaigns and APTs research by BlackArrowβ17Updated 4 years ago
- β11Updated this week
- Get a list of installed software in a safe mannerβ11Updated 7 years ago
- Cheatsheets on binary patterns and magic numbers for reverse engineeringβ10Updated 3 years ago
- Notebook collectionβ10Updated 5 years ago
- Web based code browser using clang to provide basic code analysis.β44Updated 7 years ago