Checkpoint Firewall Ruleset Auditor ( For the HTML exports when you do not have the object files )
☆39Mar 30, 2017Updated 8 years ago
Alternatives and similar repositories for myCVT
Users that are interested in myCVT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Extend WSH functionality with Registration-Free COM☆26Feb 23, 2017Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 5 months ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- anti-virtualmachine with C!☆23Apr 10, 2016Updated 9 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- ☆57Aug 7, 2020Updated 5 years ago
- Enable custom hostname resolution without editing /etc/hosts☆10Aug 11, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago