Simple tool to extract icons from a pe file and other useful information
☆13Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for pemeta
Users that are interested in pemeta are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆17Mar 24, 2024Updated 2 years ago
- A vim-inspired text editor using ncurses and C++☆10Aug 24, 2018Updated 7 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆73Aug 14, 2021Updated 4 years ago
- ☆37Sep 30, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Renault / Dacia radio code generator☆14Feb 22, 2024Updated 2 years ago
- A study about the Generalized Cross-Correlation with Phase Transform algorithm.☆14Nov 23, 2021Updated 4 years ago
- A simple elegant library to handle returning responses from Mediator handlers back to REST API handlers implementing the Operation Result…☆11Sep 19, 2024Updated last year
- sign elf binaries with GPG☆17Oct 10, 2016Updated 9 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- My homelab☆35Mar 17, 2026Updated last week
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- DOOM-UEFI☆17Oct 2, 2014Updated 11 years ago
- ☆19Sep 23, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Music Player using ImGui + SFML☆12Jul 4, 2017Updated 8 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Random stuff learned about EX-LINK via RS232☆14Aug 21, 2024Updated last year
- Lightweight text editor in cpp and sfml☆16Jun 7, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- RTI Log Parser for Connext DDS is a command-line tool that processes and enhances Connext DDS log messages making it easier to debug appl…☆12Apr 23, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- React Native boilerplate with Drawer and Bottom Tab Navigation☆18Sep 24, 2025Updated 6 months ago
- SELECT * from pgstef https://pgstef.github.io/about☆25Jan 28, 2026Updated last month
- Client for the Polish Koleo (PKP) train API.☆20Jun 1, 2020Updated 5 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Example Projects for LPC1768 Tutorials☆14Dec 4, 2024Updated last year
- Public tools, scripts or code snippets that can help when working with our products☆46Mar 12, 2026Updated 2 weeks ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- A simple PowerShell module for generating a markdown file with all the commands from a specified module for use as a basis for a readme o…☆10Apr 20, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Compilation of peHash implementations.☆14May 2, 2019Updated 6 years ago
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- ☆10Sep 9, 2015Updated 10 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Binary Code Summarization☆14Apr 3, 2025Updated 11 months ago