zcorrea357 / thg-frameworkLinks
☆8Updated 2 years ago
Alternatives and similar repositories for thg-framework
Users that are interested in thg-framework are comparing it to the libraries listed below
Sorting:
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- Telegram bot, created to verify if your e-mail leaked☆27Updated 3 years ago
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- Repositório do Curso de Ghidra☆19Updated 4 years ago
- A Unix rootkit☆17Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- Site de documentações, tutoriais e FAQ☆11Updated 4 months ago
- A simple x64 debugger for Linux☆9Updated 6 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆42Updated 6 months ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- Framebot is a C framework for Telegram Bot API.☆15Updated 6 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Updated 2 years ago
- Node.js PoC exploit code for CVE-2018-4407☆11Updated 6 years ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆24Updated 5 years ago
- 👶🏻😿 A network sniffer for Linux and macOS that currently (only) parses ETH, ARP, IP, ICMP, TCP, UDP, DNS - NOT for production!☆10Updated 6 months ago
- Brute force para MySQL com algoritmo que utiliza nome do domínio como usuário e senha, dentre outras funcionalidades.☆15Updated 9 years ago
- Presentations in different conferences☆35Updated 5 years ago
- Discover which process execute a hunted binary inside macOS☆25Updated 3 years ago
- Archive of Metasploit Framework v2 (Perl)☆16Updated 10 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- Fast, simple and portable hexadecimal/ASCII dumper☆68Updated 2 years ago
- Grab functions from radare2☆10Updated 8 years ago
- ☆17Updated 6 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Updated 6 years ago
- ☆20Updated 5 years ago
- Dwarf script to collect network requests and display on data panel☆21Updated 5 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Updated last year