Stuff you might use when exploiting software
☆82Nov 8, 2015Updated 10 years ago
Alternatives and similar repositories for exploiting
Users that are interested in exploiting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- BlizzardWrap - A CLI tool for encoding and decoding (supports several formats/algos)☆16Jun 19, 2021Updated 4 years ago
- ☆17Jan 29, 2023Updated 3 years ago
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆114Apr 25, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 5 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- ☆18May 31, 2022Updated 3 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆63May 31, 2017Updated 8 years ago
- ☆17Sep 15, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Diffing process heaps☆15Jul 23, 2022Updated 3 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- testing123☆14Nov 23, 2024Updated last year
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆32Jan 24, 2016Updated 10 years ago
- ICU - International Components for Unicode☆13Jan 10, 2026Updated 3 months ago
- translate project of Drops☆11May 26, 2016Updated 9 years ago
- Delphi/Pascal PE Protector☆19Apr 3, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Script recolected for ollydbg 1.0☆22Sep 24, 2023Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆51Jun 8, 2019Updated 6 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- ☆24Mar 3, 2020Updated 6 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)