☆27Feb 6, 2022Updated 4 years ago
Alternatives and similar repositories for pyhexdmp
Users that are interested in pyhexdmp are comparing it to the libraries listed below
Sorting:
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆168Mar 30, 2025Updated 11 months ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- A python library to parse OneNote (.one) files☆142Jul 11, 2024Updated last year
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Example project demonstrating some kind of OpenSSL certificate pinning. Related to blogpost at TKTK showing how to bypass such pinning.☆19Jan 2, 2015Updated 11 years ago
- Phone bluetooth suite that can track and prompt user notification☆17May 30, 2024Updated last year
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- ☆17Sep 3, 2015Updated 10 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- A simple web application vulnerability lab made for the HackerOne Veterans day event☆18Mar 10, 2021Updated 4 years ago
- Backend development stack for agents☆29Jul 30, 2025Updated 7 months ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆37Jul 23, 2025Updated 7 months ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year