Independent file type identification python library
☆12Mar 16, 2023Updated 3 years ago
Alternatives and similar repositories for Whatype
Users that are interested in Whatype are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- nmap - unofficial git fork☆19Aug 2, 2017Updated 8 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- Censys.io Python API Search☆43May 3, 2017Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- fiddler output to pcap☆41Mar 17, 2014Updated 12 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 3 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- This repo contains code for the parser to extract data from .tm7 and .tb7 files. The project can by consumed as a NuGet package that pars…☆16Jun 15, 2023Updated 2 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Inserts Google Tag Manager script in header.☆12Mar 2, 2017Updated 9 years ago
- LFIter2 Local File Include (LFI) Tool - Auto File Extractor & Username Bruteforcer☆16Nov 11, 2016Updated 9 years ago
- Magento module to send orders data to keen.io☆12Mar 10, 2015Updated 11 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- iPython notebooks presented in rogue.ly/spy☆23Jul 26, 2014Updated 11 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Plugin for x64dbg☆13Apr 29, 2017Updated 8 years ago
- Part 2 of our Stack Based Buffer Overflow series. Building the ROP chain.☆13Jan 28, 2022Updated 4 years ago
- An http2 stack living on top of scapy☆11Oct 24, 2018Updated 7 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Linux integrity monitoring for CentOS/RHEL☆13May 13, 2020Updated 5 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- ConnectWise-CRU☆14Mar 11, 2024Updated 2 years ago
- Reaction Commerce example theme package☆16Oct 24, 2017Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Aug 25, 2015Updated 10 years ago
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 8 years ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Mar 16, 2023Updated 3 years ago
- A flexible low-level tool to make synchronisation primitives in asyncio Python☆53May 2, 2019Updated 6 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago