svent / jsidleLinks
The JSidle Javascript packer
☆23Updated 14 years ago
Alternatives and similar repositories for jsidle
Users that are interested in jsidle are comparing it to the libraries listed below
Sorting:
- WAF Exploitation Framework☆13Updated last year
- ☆15Updated 11 years ago
- PS3 CCAPI Memory Modifier☆7Updated 10 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- ☆40Updated 7 years ago
- ETNCRAFT - The AIO Electroneum ETN miner☆8Updated 7 years ago
- OPSEC tips for the general public☆7Updated 5 years ago
- File Decrypter for the PS4 version 4.05☆16Updated 7 years ago
- An OSX exploitation helper library.☆35Updated 9 years ago
- This is an plugin that help user determine whether the visited page is cloaking or not.☆4Updated 9 years ago
- A collection of useful radare2 scripts!☆31Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- ☆18Updated 7 years ago
- Generic binary file parser☆59Updated 10 years ago
- A Flask microservice that can identify people in photos using Facebook's private facial recognition API☆4Updated 9 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆37Updated 6 years ago
- Proof-of-concept web app built on top of Frida☆19Updated 10 years ago
- Created to scrape websites and LinkedIn pages of companies for certain keywords☆5Updated 9 years ago
- An IDA (Interactive Disassembler) script that can save a chunk of binary from an address.☆11Updated 6 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- ☆9Updated 8 years ago
- Chaos Exploit for iOS 12.0 - 12.1.2 PoC & Writeup☆9Updated 6 years ago
- Pastebin Monitoring as a Service☆71Updated 11 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- ☆72Updated 10 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- ☆11Updated 6 years ago
- A curated list of tools for incident response☆29Updated last year