Prototype program to decode a video file looking for exploits/malware.
☆17Jul 26, 2020Updated 5 years ago
Alternatives and similar repositories for mp4dec
Users that are interested in mp4dec are comparing it to the libraries listed below
Sorting:
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Jul 20, 2014Updated 11 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Oct 27, 2016Updated 9 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Mar 5, 2021Updated 4 years ago
- WhatsApp end-to-end media decryptor☆94Mar 3, 2023Updated 2 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Sep 16, 2013Updated 12 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- ☆13Sep 30, 2020Updated 5 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Jun 21, 2017Updated 8 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆56May 18, 2016Updated 9 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆14Nov 19, 2018Updated 7 years ago
- The Monty Hall problem, in JavaScript☆13Oct 1, 2017Updated 8 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- A more or less universal SSL unpinning tool☆19Sep 20, 2020Updated 5 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- Simple web frontend to an elasticsearch database made for local files indexing☆19Oct 25, 2019Updated 6 years ago
- Script to generate an Android App to track location in real time☆20Jan 7, 2019Updated 7 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Learning volatility plugins.☆19Feb 16, 2021Updated 5 years ago
- A Discourse theme component that generates a table of contents for topics with one click☆26Feb 17, 2026Updated last week
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆10Mar 24, 2015Updated 10 years ago
- finds hidden parameters☆23Aug 12, 2023Updated 2 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- Mike Lindell's cybersymposium files☆48Sep 21, 2021Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Nov 26, 2018Updated 7 years ago
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 3 years ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆103Oct 17, 2022Updated 3 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- ☆26Jan 25, 2021Updated 5 years ago
- Visual Studio Code Target Communication Framework (TCF) Debugger Extension☆10Updated this week