robertdavidgraham / mp4decLinks
Prototype program to decode a video file looking for exploits/malware.
☆17Updated 5 years ago
Alternatives and similar repositories for mp4dec
Users that are interested in mp4dec are comparing it to the libraries listed below
Sorting:
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- ☆22Updated 2 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- ☆12Updated 8 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 7 years ago
- Scapy tools and scripts☆20Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 7 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago
- Automatically exported from code.google.com/p/hookme☆14Updated 10 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Various Crypter Project☆10Updated 11 years ago
- Python libraries for Windows system coding☆15Updated 5 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 10 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13Updated 4 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- ☆23Updated 12 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 7 years ago