zcorrea357 / thg-framework
☆8Updated 2 years ago
Alternatives and similar repositories for thg-framework:
Users that are interested in thg-framework are comparing it to the libraries listed below
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 3 years ago
- A simple x64 debugger for Linux☆9Updated 6 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 2 years ago
- Fuzz servers and clients using pcaps or mitm based approaches☆9Updated 5 years ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆40Updated 4 months ago
- Framebot is a C framework for Telegram Bot API.☆15Updated 6 years ago
- Binary formats☆28Updated this week
- Plugin to patch and remove ASLR from PE files on x64dbg☆38Updated 2 years ago
- ☆17Updated 6 years ago
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 3 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Tracing and parsing an executing binary file☆28Updated 9 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- Pentest tool for OSINT in social networks☆36Updated 9 years ago
- A small introduction to lkm.☆6Updated 5 months ago
- Multiplatform CLI and GUI tool to show information about ELF files☆54Updated last year
- This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.☆12Updated 5 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Discover which process execute a hunted binary inside macOS☆24Updated 3 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Fast, simple and portable hexadecimal/ASCII dumper☆68Updated 2 years ago
- ☆11Updated 4 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 7 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆23Updated 5 years ago
- laboratório sobre buffer overflows☆15Updated 8 years ago