Stuff you might use when exploiting software
☆81Nov 8, 2015Updated 10 years ago
Alternatives and similar repositories for exploiting
Users that are interested in exploiting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stanford's Machine Learning Exercises☆12Apr 7, 2020Updated 5 years ago
- ☆55May 30, 2017Updated 8 years ago
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 6 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- ☆17Jan 29, 2023Updated 3 years ago
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆114Apr 25, 2016Updated 9 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- ☆32May 9, 2021Updated 4 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- ☆18May 31, 2022Updated 3 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- ☆17Sep 15, 2017Updated 8 years ago
- testing123☆13Nov 23, 2024Updated last year
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Diffing process heaps☆15Jul 23, 2022Updated 3 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Jul 28, 2016Updated 9 years ago
- ICU - International Components for Unicode☆13Jan 10, 2026Updated 2 months ago
- Delphi/Pascal PE Protector☆19Apr 3, 2017Updated 8 years ago
- Script recolected for ollydbg 1.0☆22Sep 24, 2023Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆51Jun 8, 2019Updated 6 years ago
- ☆24Mar 3, 2020Updated 6 years ago
- Full Deobfuscator for PEUnion 4.0.0 (.NET & PE32)☆23Apr 21, 2022Updated 3 years ago
- Multiple radare2 rpipe scripts☆61Nov 6, 2017Updated 8 years ago
- Malicious Software SRC Extract☆76Dec 31, 2016Updated 9 years ago
- Rename the current workspace in Xfce at lightening speed☆11Dec 15, 2013Updated 12 years ago
- A deobfuscator for multiple python obfuscators☆23Jan 22, 2022Updated 4 years ago
- all published scripts devloped by ahmed khlief☆20Apr 3, 2020Updated 5 years ago
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago