ripPE - section extractor and profiler for PE file analysis
☆33Aug 8, 2014Updated 11 years ago
Alternatives and similar repositories for ripPE
Users that are interested in ripPE are comparing it to the libraries listed below
Sorting:
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Alternative hexdump.☆15Feb 4, 2016Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Python wrapper for the whitepages api. For more information about the whitepages api see their documentation at http://pro.whitepages.com…☆12Apr 27, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- CLI tools using Harpoon features☆24Nov 7, 2023Updated 2 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- C++ application that uses memory and code hooks to detect packers☆275Mar 5, 2018Updated 8 years ago
- A system to record malware using PANDA☆45May 20, 2019Updated 6 years ago
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Page File analysis tools.☆131Dec 3, 2015Updated 10 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- ☆11Dec 30, 2015Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Oct 10, 2015Updated 10 years ago
- ☆48Jan 6, 2023Updated 3 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- Scripting Assembly Language☆12Sep 2, 2015Updated 10 years ago
- not the worst forensics regexp—this is not the primary repo; caveat programmer☆30May 7, 2019Updated 6 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Oct 6, 2016Updated 9 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- ld-linux code injector☆50Oct 28, 2011Updated 14 years ago