GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit
☆24Jul 1, 2015Updated 10 years ago
Alternatives and similar repositories for WinBinaryAudit
Users that are interested in WinBinaryAudit are comparing it to the libraries listed below
Sorting:
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- Golang syscall firehose (programmatic strace/dtruss)☆13Nov 26, 2020Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- ☆12Feb 4, 2019Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Jan 16, 2026Updated last month
- Portable Executable parsing library, used by PEExplorer. Also available as a nuget package☆36Jan 11, 2018Updated 8 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- KVM-based memory access recorder☆20Oct 14, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- Comparison table of VMX capabilities for a bunch of processors☆13Nov 3, 2020Updated 5 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- An API Monitor based on Instrumentation☆43Dec 19, 2017Updated 8 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 10 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Store arbitrary data on Flickr☆273May 28, 2013Updated 12 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago