A utility to dump memory of unixy processes
☆19Apr 5, 2022Updated 4 years ago
Alternatives and similar repositories for memdump
Users that are interested in memdump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆14Feb 16, 2021Updated 5 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated 2 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- A simple /dev/mem dumper for Linux☆19Aug 17, 2022Updated 3 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- Farm-to-table, organic, handcrafted, delicious Webassembly☆15Dec 7, 2021Updated 4 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Utility to manipulate SDBM files used by ModSecurity. With that utility it is possible to _shrink_ SDBM databases. It is also possible to…☆22Aug 16, 2024Updated last year
- Locates installed Perl modules.☆22Apr 16, 2023Updated 3 years ago
- Linux shell scripts☆26Sep 25, 2016Updated 9 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Find JNI native methods while the app is running.☆23Oct 26, 2024Updated last year
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 11 years ago
- Add audio to Web images☆50Sep 9, 2013Updated 12 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Forensic Analysis Tool for Btrfs File System.☆20Aug 6, 2018Updated 7 years ago
- Memfetch is a simple utility to dump all memory of a running process, either immediately or when a fault condition is discovered. It is a…☆42Feb 8, 2018Updated 8 years ago
- Have fun!☆31Nov 5, 2017Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- scripts and examples for using JTAG debug tools to gain root access☆27Aug 15, 2016Updated 9 years ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- Socket programming tutorials in C, python, perl, java, winsock☆30Jun 26, 2013Updated 12 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Smemstat reports the physical memory usage taking into consideration shared memory. The tool can either report a current snapshot of memo…☆36Jan 1, 2025Updated last year
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Dec 29, 2021Updated 4 years ago
- Resources for security engineer job search.☆11Jan 25, 2026Updated 3 months ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago