Memory searching utilities
☆43Nov 11, 2013Updated 12 years ago
Alternatives and similar repositories for memgrep
Users that are interested in memgrep are comparing it to the libraries listed below
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 4 months ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- ☆13Jun 26, 2023Updated 2 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Yet Another SWF Parser☆33Mar 4, 2022Updated 4 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- 新闻聚合+新闻推荐网站☆10Jun 21, 2017Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Passive UAC elevation using dll infection☆75Nov 7, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Tool to parse SRU database☆25Mar 1, 2018Updated 8 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Duilib仿迅雷精简版界面☆16Oct 10, 2017Updated 8 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Linux kernel module for driving an USB3380 board, exposing a /dev/pciemem device node on the analysis machine representing the physical m…☆15Nov 14, 2025Updated 4 months ago
- ☆12Sep 12, 2020Updated 5 years ago