Simple tool to extract icons from a pe file and other useful information
☆13Jun 22, 2018Updated 7 years ago
Alternatives and similar repositories for pemeta
Users that are interested in pemeta are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆17Mar 24, 2024Updated 2 years ago
- A vim-inspired text editor using ncurses and C++☆10Aug 24, 2018Updated 7 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆73Aug 14, 2021Updated 4 years ago
- ☆37Sep 30, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Renault / Dacia radio code generator☆14Feb 22, 2024Updated 2 years ago
- A study about the Generalized Cross-Correlation with Phase Transform algorithm.☆14Nov 23, 2021Updated 4 years ago
- A simple elegant library to handle returning responses from Mediator handlers back to REST API handlers implementing the Operation Result…☆10Sep 19, 2024Updated last year
- sign elf binaries with GPG☆17Oct 10, 2016Updated 9 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- My homelab☆37Updated this week
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- DOOM-UEFI☆17Oct 2, 2014Updated 11 years ago
- ☆19Sep 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Music Player using ImGui + SFML☆12Jul 4, 2017Updated 8 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Lightweight text editor in cpp and sfml☆16Jun 7, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Random stuff learned about EX-LINK via RS232☆15Aug 21, 2024Updated last year
- RTI Log Parser for Connext DDS is a command-line tool that processes and enhances Connext DDS log messages making it easier to debug appl…☆12Apr 23, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- multiduplicut : optimize wordlists-based password cracking methods chaining☆15Feb 25, 2022Updated 4 years ago
- React Native boilerplate with Drawer and Bottom Tab Navigation☆18Sep 24, 2025Updated 6 months ago
- SELECT * from pgstef https://pgstef.github.io/about☆25Jan 28, 2026Updated 2 months ago
- Client for the Polish Koleo (PKP) train API.☆20Jun 1, 2020Updated 5 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Example Projects for LPC1768 Tutorials☆14Dec 4, 2024Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆31Jan 27, 2023Updated 3 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Mar 12, 2026Updated last month
- A simple PowerShell module for generating a markdown file with all the commands from a specified module for use as a basis for a readme o…☆10Apr 20, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- Compilation of peHash implementations.☆14May 2, 2019Updated 6 years ago
- ☆10Sep 9, 2015Updated 10 years ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago