ynadji / peidView external linksLinks
☆19Aug 13, 2015Updated 10 years ago
Alternatives and similar repositories for peid
Users that are interested in peid are comparing it to the libraries listed below
Sorting:
- Basic file metadata gathering script☆21Apr 16, 2025Updated 9 months ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- This is an OllyDbg plugin which will help you to import map files exported by IDA, Dede, IDR, Microsoft and Borland linkers.☆22Aug 12, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- In memory fuzzing for embedded devices☆19Jun 20, 2012Updated 13 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Yaras Random☆23Feb 21, 2019Updated 6 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 10 years ago
- ☆40Nov 5, 2019Updated 6 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- ☆28Aug 24, 2014Updated 11 years ago
- ssl-cipher-suite enum is a Perl script to enumerate supported SSL cipher suites supported by network services (principally HTTPS)☆30Apr 5, 2021Updated 4 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- x64dbg Script editor v2.0☆27Oct 26, 2017Updated 8 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- Reverse Engineer ALL The Things (tm)☆53May 17, 2012Updated 13 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A dark theme for WinDBG.☆35Jul 9, 2014Updated 11 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 7 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- ☆16Aug 17, 2013Updated 12 years ago
- ☆18Jun 13, 2025Updated 8 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago