swoops / video-game-save-file-trojansLinks
Demonstrates why it's not safe to download random save files from the Internet
☆17Updated 2 years ago
Alternatives and similar repositories for video-game-save-file-trojans
Users that are interested in video-game-save-file-trojans are comparing it to the libraries listed below
Sorting:
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- details about DIAL protocol vulnerabilities☆30Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- A C# Tool to gather information about email breaches☆15Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- IPFS☆16Updated 7 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- Legba recipes.☆49Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆14Updated 2 months ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- ☆16Updated 5 months ago
- Custom Binary Ninja Themes☆12Updated last year
- Network Traffic Fuzzer☆18Updated 9 months ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆43Updated 3 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Still point in moving world.☆50Updated 3 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated last month
- ☆28Updated 2 years ago
- ☆19Updated 3 years ago
- Build wordlists from the common-crawl index☆11Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆14Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- Frida plugin for Binary Ninja☆18Updated 8 months ago
- ☆13Updated 6 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 9 months ago