☆71May 6, 2018Updated 7 years ago
Alternatives and similar repositories for winexe
Users that are interested in winexe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Jul 11, 2019Updated 6 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 8 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Uses Core's Impacket Library to get the password policy from a windows machine☆43Mar 1, 2025Updated last year
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- Use LD_PRELOAD to redirect socket ports or unix domain socket paths☆13Sep 29, 2020Updated 5 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- cheap and terrible voltage glitcher hardware/software☆43Jan 1, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- SSL certificate cloner☆14Jan 25, 2018Updated 8 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- A Reverse Engineering Tool for py2exe applications.☆210May 21, 2017Updated 8 years ago
- x86 / x64 Processor Manual for Binary Ninja☆16Mar 7, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- THC "R U There" network discovery tool☆30May 1, 2020Updated 5 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- wxWidgets implementation of ZipPicView☆16Aug 7, 2016Updated 9 years ago