zcorrea357 / thg-framework
☆8Updated 2 years ago
Alternatives and similar repositories for thg-framework:
Users that are interested in thg-framework are comparing it to the libraries listed below
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Binary formats☆27Updated this week
- Plugin to patch and remove ASLR from PE files on x64dbg☆38Updated 2 years ago
- A command line Swiss army knife for string and number conversions☆18Updated 5 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆40Updated 3 months ago
- Framebot is a C framework for Telegram Bot API.☆15Updated 6 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆23Updated 5 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- a cpp wrapper for ngrok☆8Updated 3 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 3 years ago
- A small introduction to lkm.☆6Updated 4 months ago
- A simple x64 debugger for Linux☆9Updated 6 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Updated last year
- Um guia para os dispostos a se iniciarem na arte de programar em Perl.☆11Updated 2 months ago
- Fuzz servers and clients using pcaps or mitm based approaches☆9Updated 5 years ago
- 👶🏻😿 A network sniffer for Linux and macOS that currently (only) parses ETH, ARP, IP, ICMP, TCP, UDP, DNS - NOT for production!☆10Updated 3 months ago
- Amarula Python Botnet☆9Updated 6 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A Unix rootkit☆16Updated 4 years ago
- Capture newly created files on Windows☆64Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- Discover which process execute a hunted binary inside macOS☆24Updated 3 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- TightVNC Vulnerability.☆16Updated 3 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Pequenos tutoriais e exemplos de código☆8Updated 3 years ago