mrinalwahal / Obfuscator
Python Script Obfuscator
☆10Updated 10 years ago
Alternatives and similar repositories for Obfuscator:
Users that are interested in Obfuscator are comparing it to the libraries listed below
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- A script to reverse-engineer anti-virus signatures☆32Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 2 months ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆16Updated 8 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Network white noise collector☆18Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- CTF Writeups☆23Updated 6 years ago
- An ELF parasite command injector.☆34Updated 7 years ago
- ☆35Updated 2 months ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago