A simple script for quickly mining sensitive information in binary files.
☆30Dec 1, 2020Updated 5 years ago
Alternatives and similar repositories for Minitools-bin_extractor
Users that are interested in Minitools-bin_extractor are comparing it to the libraries listed below
Sorting:
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- A simple xss bot template☆22Sep 21, 2020Updated 5 years ago
- ipstatistics is a script based on the ipip library that is used to quickly filter the ip list.☆14Aug 21, 2020Updated 5 years ago
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- 分析cobaltstrike c2 协议☆68Feb 24, 2020Updated 6 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Burpsuite Plugin For AES Crack☆37Jun 17, 2020Updated 5 years ago
- ☆26Aug 12, 2020Updated 5 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack☆27Mar 6, 2021Updated 5 years ago
- CVE-2020-17008 splWOW64 Elevation of Privilege☆46Dec 24, 2020Updated 5 years ago
- simple and clean ip look up with bootstrap template☆131Sep 30, 2020Updated 5 years ago
- DLL_Hijacker.py☆75Sep 21, 2015Updated 10 years ago
- ☆11Mar 14, 2019Updated 7 years ago
- ☆17Nov 24, 2020Updated 5 years ago
- ☆15Nov 4, 2020Updated 5 years ago
- 010Editor Templates☆13May 29, 2024Updated last year
- zentao Getshell☆10Oct 27, 2020Updated 5 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- 御剑算号破解激活工具☆12Mar 20, 2019Updated 7 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- 强网杯pop_master go解法☆31Jul 13, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- Treat XPath expressions as Python objects☆11Mar 31, 2021Updated 4 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- 电信光猫HG2821T-U家庭网关代码执行反弹shell的PoC☆11Oct 9, 2019Updated 6 years ago
- Crack php rand() state☆13May 7, 2018Updated 7 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated last year
- ☆80Feb 26, 2025Updated last year
- macaron 项目源码注解. macaron 是一款使用 golang 开发的高性能 web 框架.☆14Nov 1, 2016Updated 9 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆49Jul 6, 2015Updated 10 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- Exploit for WebSocket Vulnerability in Apache Tomcat☆169Nov 2, 2020Updated 5 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- CVE-2021-3156非交互式执行命令☆203Feb 9, 2021Updated 5 years ago
- Package generating elasticsearch mapping from jsonschemas☆14Jul 31, 2019Updated 6 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆11Jun 14, 2014Updated 11 years ago
- InternetCensus2012☆43Jun 7, 2015Updated 10 years ago