☆50Dec 28, 2012Updated 13 years ago
Alternatives and similar repositories for vtrace_scripts
Users that are interested in vtrace_scripts are comparing it to the libraries listed below
Sorting:
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- please use https://github.com/fireeye/vivisect instead☆16Oct 21, 2025Updated 4 months ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆30Nov 8, 2012Updated 13 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Dec 29, 2015Updated 10 years ago
- Corewar project fully written in x86 Assembly - NASM - Linux☆20Jan 19, 2016Updated 10 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- ☆988Jan 16, 2026Updated 2 months ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- A collection of useful functions to write an exploit in OCaml☆17Oct 11, 2014Updated 11 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- H2HC Community Project to Create Exploit Challenges for Practicing☆20Nov 24, 2012Updated 13 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- screwing around with osx reversing :)☆38Nov 4, 2016Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- IDA Pro MSDN Helper☆39Sep 5, 2016Updated 9 years ago
- sebug.net上面的镜像☆63Apr 8, 2014Updated 11 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago