MD5 algorithm implementation - x86 assembler
☆25Mar 15, 2015Updated 11 years ago
Alternatives and similar repositories for rewolf-md5
Users that are interested in rewolf-md5 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple tool to bundle windows DLLs with PE executable☆117Mar 13, 2015Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 11 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆23Nov 28, 2024Updated last year
- Java VM Operand Stack Viewer☆25Sep 11, 2015Updated 10 years ago
- Mortal Kombat GRA files parser. More details at http://blog.rewolf.pl/blog/?p=1837☆16Aug 24, 2018Updated 7 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆29Aug 18, 2025Updated 7 months ago
- Inject shellcode into extra file alignment padding of a PE and change the entry point to point to the shellcode. On execution, the shellc…☆22Oct 29, 2012Updated 13 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- libopcodes-based disassembler☆35Aug 8, 2020Updated 5 years ago
- A volatility 2 docker for forensic investigations☆25Sep 10, 2025Updated 6 months ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- ☆18Mar 13, 2021Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- hexdumpmem is hexdump-like tool to dump memory and write memory. When developing a system on a SoC, I usually need to dump or write memor…☆11Jun 28, 2022Updated 3 years ago
- *DEPRECATED* Advanced skinning plugin for IDA Pro, ported to x64dbg☆32Nov 23, 2016Updated 9 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Redress Dissassembler is a cross platform binary disassembler written in Java with Capstone bindings☆24Mar 22, 2016Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Special IDA Pro tools for the Sega Genesis/Megadrive romhackers☆69Apr 29, 2021Updated 4 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Threat Intelligence Sharing Platform☆11Updated this week
- A python tool to parse and describe the SDDL string.☆17Jan 5, 2026Updated 2 months ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- Simple anti-tamper embedded into a simple string encryption.☆10Mar 7, 2019Updated 7 years ago
- A python exploit to automatically dump all the data stored by the auto-completion plugin of Ametys CMS to a local sqlite database file.☆14May 3, 2022Updated 3 years ago
- ☆12Apr 13, 2017Updated 8 years ago