nyxxxie / serenity
Universal guided editor and reverse engineering tool for binary data.
☆11Updated 7 years ago
Alternatives and similar repositories for serenity:
Users that are interested in serenity are comparing it to the libraries listed below
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- NSA - NoScript Anywhere (Firefox Mobile add-on)☆8Updated 8 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 5 months ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- An embedded wireless security audit system☆21Updated 12 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 8 months ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Updated 8 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Tooling for data type and structure management☆10Updated 3 months ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- A strcmp timing attack example☆9Updated 10 years ago