Base64 Mutator
☆13Feb 13, 2021Updated 5 years ago
Alternatives and similar repositories for b64mute
Users that are interested in b64mute are comparing it to the libraries listed below
Sorting:
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- quality of life☆19Dec 24, 2019Updated 6 years ago
- Python MapleStory Server☆23Feb 8, 2023Updated 3 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- Tetusji - Pokemon Crystal JP Remote Code Execution☆35Oct 30, 2022Updated 3 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Helpers to build Tor statically☆89Jun 18, 2024Updated last year
- Cloak files using text based steganography output to obsfucate what data they contain. Coded in Powershell. This is a port of TryCatchH…☆44Feb 6, 2021Updated 5 years ago
- A Golang library for Tor.☆42Dec 9, 2020Updated 5 years ago
- Self-hosted multi-tenant and multi-host Containers as a Service platform using LXD or Firecracker☆18Jan 27, 2020Updated 6 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A radio frequency database☆11Jun 8, 2023Updated 2 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- TCP location updating proxy for Kismet Remote☆12Jan 20, 2022Updated 4 years ago
- anonymous bbs with almost no features☆12Mar 29, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Decodes Compact Disc data from microscope images of a CD's surface☆12Jan 14, 2023Updated 3 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago