A PE Header-Based Antivirus Tool
☆12Nov 14, 2014Updated 11 years ago
Alternatives and similar repositories for PE-Header-Parser-in-Python
Users that are interested in PE-Header-Parser-in-Python are comparing it to the libraries listed below
Sorting:
- WYSIWYG Text Html Editor on Bootstrap☆11Apr 15, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Repository for the HackRPI 11 Event Mobile App☆12Apr 25, 2024Updated last year
- jQuery plugin that creates an responsive Menu on website.☆12Jun 13, 2018Updated 7 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- A(nother) Binary Analysis Framework☆30Jun 10, 2014Updated 11 years ago
- Generates random utf-8 strings for fuzz t�sting character encoding probl�ms☆11Aug 21, 2015Updated 10 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- Allow exploration and conservation of political ads archives☆11Apr 27, 2022Updated 3 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- ☆11Jun 10, 2015Updated 10 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- The implementation of the first generation DeepID☆11Jul 6, 2021Updated 4 years ago
- Static analysis plugin for x64dbg (now deprecated).☆29Jul 13, 2014Updated 11 years ago
- A measurement archive for collecting time series metrics from networks.☆10Sep 16, 2025Updated 6 months ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Library that adds the ability to reverse-engineer classes, interfaces, functions, constants and more.☆60Oct 6, 2020Updated 5 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 8 years ago
- PXE Boot Service with TFTP Server☆19Sep 2, 2023Updated 2 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Virus Detection using Bayesian Analysis.☆21Jan 25, 2014Updated 12 years ago
- A set of tools which solves the coin change problem to generate ROP payloads☆18Aug 18, 2014Updated 11 years ago
- A CLI implementation of the viral wordle puzzle game in python☆11Feb 20, 2022Updated 4 years ago
- A Simple way to draw text in macroquad with support of using glyphs from multiple fonts in a single draw_text call, also known as fallbac…☆11Feb 4, 2024Updated 2 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Crash reporter used in RedisDesktopManager☆16Sep 19, 2018Updated 7 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆17Nov 24, 2022Updated 3 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆10Oct 1, 2022Updated 3 years ago
- A high-quality & reliable Solid Hooks library.☆14Dec 4, 2023Updated 2 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- Information Theory project : Implementation of JPEG Image Compression☆10Nov 5, 2019Updated 6 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Control fans on my server with a Corsair Commander Pro☆10Nov 8, 2023Updated 2 years ago
- A random grab-bag of things.☆16Mar 13, 2018Updated 8 years ago