zcorrea357 / thg-frameworkLinks
☆8Updated 2 years ago
Alternatives and similar repositories for thg-framework
Users that are interested in thg-framework are comparing it to the libraries listed below
Sorting:
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Framebot is a C framework for Telegram Bot API.☆15Updated 6 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆24Updated 5 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- ☆19Updated 10 years ago
- Um guia para os dispostos a se iniciarem na arte de programar em Perl.☆11Updated 5 months ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆41Updated 5 months ago
- Vimana is an experimental security tool that aims to provide resources for auditing Python web applications.☆39Updated 3 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- A command line Swiss army knife for string and number conversions☆18Updated 5 years ago
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆31Updated 2 weeks ago
- laboratório sobre buffer overflows☆15Updated 8 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- H2HC 2016 Slides/Materials/Presentations☆29Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆17Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- A Unix rootkit☆16Updated 4 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated last month
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- File antivirus☆10Updated 5 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago