robomotic / pemetaView external linksLinks
Simple tool to extract icons from a pe file and other useful information
☆13Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for pemeta
Users that are interested in pemeta are comparing it to the libraries listed below
Sorting:
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆37Sep 30, 2021Updated 4 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆70Aug 14, 2021Updated 4 years ago
- sign elf binaries with GPG☆17Oct 10, 2016Updated 9 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Parse IE, FireFox, Chrome and Safari Cookies for Google Analytic values☆23Sep 3, 2016Updated 9 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- A virtual terminal for parsing ANSI escape codes in python☆29Nov 15, 2010Updated 15 years ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆34May 26, 2019Updated 6 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- Fuzzy Hash calculated from import API of PE files☆91Aug 26, 2022Updated 3 years ago
- Handy HxD plugin for various conversions like base64☆37Oct 12, 2020Updated 5 years ago
- ☆15Mar 24, 2024Updated last year
- Identifies music based on microphone input. By request of someone in r/learnprogramming.☆19Dec 8, 2012Updated 13 years ago
- Copy and Paste standard library (CPSTL) is a repository with a collection of data structure and algorithms in many different languages☆13Feb 15, 2025Updated 11 months ago
- Dead simple JSON Formatter☆10Oct 21, 2016Updated 9 years ago
- A collection of advent of code solutions.☆10Dec 28, 2015Updated 10 years ago
- bitCollector - DFIR (Digital Forensics and Incident Response) Triage Collector☆12Aug 18, 2025Updated 5 months ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- 📄Source code variable naming using a seq2seq architecture☆10Mar 19, 2020Updated 5 years ago
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- TA505 unpacker Python 2.7☆47Jun 22, 2020Updated 5 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Feb 5, 2026Updated last week
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Data to test capa's code and rules.☆47Jan 28, 2026Updated 2 weeks ago
- A dynamic compilation framework for PTX (forked from Google Code).☆10Jul 31, 2016Updated 9 years ago
- ☆15Oct 20, 2011Updated 14 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- RACF Database Parser☆11Apr 4, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Source code for the example presented in my article for Code Words Issue Six.☆12Mar 22, 2016Updated 9 years ago
- run, monitor and closer remote SSH processes automatically☆12Oct 10, 2019Updated 6 years ago