zcorrea357 / thg-framework
☆8Updated 2 years ago
Alternatives and similar repositories for thg-framework:
Users that are interested in thg-framework are comparing it to the libraries listed below
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆40Updated 2 months ago
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- Fuzz servers and clients using pcaps or mitm based approaches☆9Updated 5 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 3 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆38Updated 2 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- A simple x64 debugger for Linux☆9Updated 5 years ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 3 years ago
- Windows Reverse TCP backdoor☆29Updated 5 years ago
- Published Articles of the Past (trying to be as complete as possible)☆15Updated 4 years ago
- A simple multiplatform command line search tool for Windows API.☆46Updated 2 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- Dwarf script to collect network requests and display on data panel☆21Updated 4 years ago
- Plugin Manager for IDA Pro☆9Updated 9 years ago
- Exploit development challenges!☆24Updated last year
- Multiplatform CLI and GUI tool to show information about ELF files☆52Updated last year
- Fast, simple and portable hexadecimal/ASCII dumper☆68Updated 2 years ago
- ☆17Updated 6 years ago
- Collection of ezine about virii☆15Updated 2 years ago
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- Node.js PoC exploit code for CVE-2018-4407☆11Updated 6 years ago
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is …☆20Updated 6 years ago
- Solutions to crackmes☆18Updated 9 years ago
- Binary formats☆26Updated this week
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago