soen-vanned / forced-evolutionLinks
forced-evolution
☆31Updated 12 years ago
Alternatives and similar repositories for forced-evolution
Users that are interested in forced-evolution are comparing it to the libraries listed below
Sorting:
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Exploits and research stuffs☆54Updated 2 months ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 10 years ago
- ☆27Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 10 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 5 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 8 years ago
- ☆74Updated 3 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- ☆51Updated 8 years ago
- Security tools to use on assessments.☆40Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- Small tool for disassembling shellcode (using objdump)☆148Updated 3 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- A regex based source code scanner.☆127Updated 8 years ago
- NCC Code Navigator☆55Updated 9 years ago
- Veil Catapult is no longer supported☆75Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Modules, Scripts, Plugins for the Metasploit Framework☆20Updated 14 years ago
- A python script used to parse the SAM registry hive.☆74Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- POLAR☆74Updated 6 years ago
- ☆63Updated 13 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago