IDA Pro plugin that rename functions on load, based on functionality
☆19Mar 9, 2018Updated 7 years ago
Alternatives and similar repositories for IDA_AutoAnalysis
Users that are interested in IDA_AutoAnalysis are comparing it to the libraries listed below
Sorting:
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- 使用 Node.js 與 FB API 架起來的匿名發文系統☆12Apr 29, 2016Updated 9 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆50Nov 3, 2025Updated 3 months ago
- ☆16Mar 4, 2019Updated 6 years ago
- Proof of concept exploit script used to exploit the MS15-034 vulnerability in the Windows HTTP Protocol Stack (HTTP.sys)☆18Mar 27, 2017Updated 8 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 7 years ago
- ☆18Nov 7, 2017Updated 8 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Mar 24, 2017Updated 8 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last week
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- This repository includes the instructor examples along with personal solutions for all the modules of SPSE. SPSE (Security Tube Python Sc…☆25Aug 2, 2019Updated 6 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago