rafael-santiago / mr-hydeLinks
A collection of steganography tools.
☆15Updated 5 years ago
Alternatives and similar repositories for mr-hyde
Users that are interested in mr-hyde are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- A collection of crackmes☆40Updated 10 months ago
- ☆17Updated 11 years ago
- A Qt-based disassembly viewer based on radare2☆76Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 10 years ago
- Learn the very basics of different languages☆49Updated 8 months ago
- free crypto audit☆31Updated 8 years ago
- HTTP framework☆48Updated 8 years ago
- Run basic functions from stripped binaries cross platform☆113Updated 9 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- A debugger frontend☆141Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆80Updated 6 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- an open source toolkit for PCI bus exploration☆72Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Monitor for any changes in your C/C++ files and automatically compiles and runs the program☆13Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆46Updated 5 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- ASM Malicious code - PE infector☆72Updated 8 years ago
- googleusercontent.com as HTTP(S) proxy☆54Updated 5 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago