☆14Jan 24, 2016Updated 10 years ago
Alternatives and similar repositories for detpdb
Users that are interested in detpdb are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- IDA ExtraPass PlugIn☆15Jan 24, 2016Updated 10 years ago
- Patch binaries at load-time☆23Dec 27, 2011Updated 14 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- ☆20Feb 23, 2019Updated 7 years ago
- ☆17Jun 3, 2025Updated 8 months ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- A Volatility plugin for finding sqlite database rows☆21Jul 14, 2019Updated 6 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- Fedora SELinux Userspace☆28Feb 2, 2026Updated last month
- EditBox is a plugin for the Volatility Framework. It extracts the text from Windows Edit controls, that is, textboxes as generated by Win…☆24Jun 4, 2017Updated 8 years ago
- ☆27Aug 25, 2020Updated 5 years ago
- Windows Kernel Debugger over Network (Wireshark dissector and maybe more)☆29Jan 28, 2019Updated 7 years ago
- Snowman decompiler☆110Sep 29, 2017Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Dec 14, 2018Updated 7 years ago
- The Official Website of Northeastern University.☆10Nov 12, 2015Updated 10 years ago
- Google Chrome internals analysis using Volatility☆42Nov 17, 2022Updated 3 years ago
- JS library that helps get the closest AWS region from a country code☆12Jan 14, 2023Updated 3 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- An ESM package that uses Web Streams API to create v1, v2 or hybrid torrents in your web browser☆10Aug 5, 2025Updated 6 months ago
- Assimilation of all previous H2 to H3 conversion tools under a UI☆10Jul 19, 2025Updated 7 months ago
- ☆11Jul 29, 2020Updated 5 years ago
- Manufacture peripheral Library - MPLib, modified by CooCox in order to add to CoIDE(http://www.coocox.org)☆12Jul 24, 2014Updated 11 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Cisco Meraki CMX WiFi Presence receiver☆12Apr 17, 2019Updated 6 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- Collection of tools for fetching and processing Street View imagery, adapted from code by @kotarohara☆12Feb 13, 2026Updated 2 weeks ago
- ☆10Aug 26, 2016Updated 9 years ago