Use computer vision to determine if an IDN can be interpreted as something it's not
☆61May 8, 2017Updated 8 years ago
Alternatives and similar repositories for deceptiveidn
Users that are interested in deceptiveidn are comparing it to the libraries listed below
Sorting:
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 9 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Sep 21, 2017Updated 8 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- 将自动爬虫的结果判断是否属于hooks,并不断抓取url爬啊爬。☆30Jun 2, 2017Updated 8 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- The Seeker of IOC☆131Oct 2, 2020Updated 5 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Writing a 32-bit Protected Mode OS in NASM☆13Jun 22, 2012Updated 13 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Web based application for managing your Sourcemod servers and users☆13Aug 8, 2014Updated 11 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- ☆30May 23, 2017Updated 8 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- Finds and display's your windows (XP, Vista, 7, 8, 8.1, 10) product key.☆16Jun 30, 2015Updated 10 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- spy windows ce API calls☆11Jun 3, 2014Updated 11 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- PE/PE +(64bit) Viewer (Qt 5.8)☆10Aug 3, 2018Updated 7 years ago
- 🗑 Simple program to uninstall some of the Windows 10 apps, that you cannot remove easily.☆10Jan 11, 2020Updated 6 years ago
- cocos做的斗地主游戏☆10Dec 28, 2015Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- ...☆10Feb 16, 2015Updated 11 years ago