An open source real-time network topology and protocols analyzer
☆29Feb 22, 2017Updated 9 years ago
Alternatives and similar repositories for skydive
Users that are interested in skydive are comparing it to the libraries listed below
Sorting:
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- ☆20Feb 5, 2026Updated 3 weeks ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Insiderer looks inside files for metadata and hidden content☆37May 11, 2015Updated 10 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Feb 25, 2023Updated 3 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- git clone all repositories and gists from a given GitHub username☆32Nov 15, 2025Updated 3 months ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Sep 11, 2018Updated 7 years ago
- Web service for scanning pcaps with snort☆110Jul 4, 2018Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- ☆34Jan 22, 2025Updated last year
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Nov 21, 2018Updated 7 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆114Apr 16, 2016Updated 9 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 7 years ago
- Cannabis strain information☆10Feb 20, 2016Updated 10 years ago
- PE file mapping and manipulation package.☆36May 6, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆11Nov 14, 2020Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A tool that can used for hacking :- reverse-shells, email-attacks, ip tracker and tracer.☆10Aug 3, 2022Updated 3 years ago
- Web of trust grapher☆40Updated this week
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- ☆32Feb 7, 2018Updated 8 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- Metasploit for machine learning.☆572Mar 25, 2023Updated 2 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- An Example Plugin for MelonLoader☆11Dec 8, 2024Updated last year
- Jami is a simple cross-platform GUI for playing some musical instruments☆11Jul 3, 2024Updated last year