Jar2Exe extraction tool
☆15Dec 28, 2022Updated 3 years ago
Alternatives and similar repositories for e2j
Users that are interested in e2j are comparing it to the libraries listed below
Sorting:
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Direct system calls by nim☆14Mar 15, 2022Updated 3 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆30Oct 26, 2025Updated 4 months ago
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 4 months ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 11 years ago
- ☆17May 27, 2023Updated 2 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆50Nov 3, 2025Updated 4 months ago
- CircleCI log and security configuration automations☆22Sep 20, 2020Updated 5 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Slide decks and/or materials from conference presentations☆56Nov 15, 2022Updated 3 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- A console debugger using DbgX and Terminal.Gui☆30Oct 12, 2022Updated 3 years ago
- [DEPRECATED, use specter instead] like ngrok, but ambitious☆36Apr 5, 2022Updated 3 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 7 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- ☆11Sep 23, 2025Updated 5 months ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Sep 3, 2021Updated 4 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆37May 8, 2022Updated 3 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆59Feb 21, 2026Updated last week
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆45May 10, 2021Updated 4 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year