All Projects → Memject → Similar Projects or Alternatives

1078 Open source projects that are alternatives of or similar to Memject

Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+936.36%)
Mutual labels:  hacking
Awesome Cryptocurrency Security
😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)
Stars: ✭ 102 (-42.05%)
Mutual labels:  reverse-engineering
Panopticon
A libre cross-platform disassembler.
Stars: ✭ 1,376 (+681.82%)
Mutual labels:  reverse-engineering
Arduino Fastled Music Visualizer
An Arduino based music visualizer using the FastLED library and a strip of individually addressable LEDs
Stars: ✭ 134 (-23.86%)
Mutual labels:  hacking
Hexd
🔍 Colourful, human-friendly hexdump tool
Stars: ✭ 100 (-43.18%)
Mutual labels:  reverse-engineering
Itrace
🍰 Trace objc method call for ios and mac
Stars: ✭ 170 (-3.41%)
Mutual labels:  hacking
Timelapse
A time lapse app for Sony Alpha camera using the OpenMemories framework
Stars: ✭ 101 (-42.61%)
Mutual labels:  hacking
Portia
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised. Portia performs privilege escalation as well as lateral movement automatically in the network
Stars: ✭ 154 (-12.5%)
Mutual labels:  hacking
Apk Utilities
🛠 Tools and scripts to manipulate Android APKs
Stars: ✭ 134 (-23.86%)
Mutual labels:  reverse-engineering
Idbutil
Library and tool for reading IDApro databases.
Stars: ✭ 100 (-43.18%)
Mutual labels:  reverse-engineering
Bruteshark
Network Analysis Tool
Stars: ✭ 1,335 (+658.52%)
Mutual labels:  hacking
Mazewalker
Toolkit for enriching and speeding up static malware analysis
Stars: ✭ 132 (-25%)
Mutual labels:  reverse-engineering
Aura Botnet
A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (-46.02%)
Mutual labels:  hacking
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-14.77%)
Mutual labels:  hacking
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-44.89%)
Mutual labels:  hacking
Mgbdis
Game Boy ROM disassembler with RGBDS compatible output
Stars: ✭ 131 (-25.57%)
Mutual labels:  reverse-engineering
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-44.89%)
Mutual labels:  hacking
Anno1800 Mod Loader
The one and only mod loader for Anno 1800, supports loading of unpacked RDA files, XML merging and Python mods.
Stars: ✭ 161 (-8.52%)
Mutual labels:  reverse-engineering
Python Ransomware
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-45.45%)
Mutual labels:  hacking
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-25.57%)
Mutual labels:  hacking
Spykeyboard
keylogger which sends us the data to our gmail.
Stars: ✭ 95 (-46.02%)
Mutual labels:  hacking
Jalesc
Just Another Linux Enumeration Script: A Bash script for locally enumerating a compromised Linux box
Stars: ✭ 152 (-13.64%)
Mutual labels:  hacking
Ssh Mitm
SSH man-in-the-middle tool
Stars: ✭ 1,328 (+654.55%)
Mutual labels:  hacking
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+1128.98%)
Mutual labels:  hacking
Formationvideo
Contenus et ressources de la chaîne FormationVidéo (YouTube)
Stars: ✭ 91 (-48.3%)
Mutual labels:  hacking
Attiny85
RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-3.98%)
Mutual labels:  hacking
Fundamentos Engenharia Reversa
Livro: Fundamentos de Engenharia Reversa
Stars: ✭ 93 (-47.16%)
Mutual labels:  reverse-engineering
Evil Winrm
The ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1178.98%)
Mutual labels:  hacking
Ida For Delphi
IDA Python Script to Get All function names from Event Constructor (VCL)
Stars: ✭ 92 (-47.73%)
Mutual labels:  reverse-engineering
Privilege Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+1102.84%)
Mutual labels:  hacking
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5838.07%)
Mutual labels:  hacking
Ida for mac green
IDA Pro for macOS绿化
Stars: ✭ 129 (-26.7%)
Mutual labels:  reverse-engineering
Cutter
Free and Open Source Reverse Engineering Platform powered by rizin
Stars: ✭ 10,073 (+5623.3%)
Mutual labels:  reverse-engineering
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-7.95%)
Mutual labels:  hacking
Pirogue
PiRogue is a small device meant to ease network interception and analysis.
Stars: ✭ 90 (-48.86%)
Mutual labels:  reverse-engineering
Jnianalyzer
Analysis scripts for Ghidra to work with Android NDK libraries.
Stars: ✭ 128 (-27.27%)
Mutual labels:  reverse-engineering
Instabruteforce
hacking-tool termux-tools termux noob-friendly instagram-bot bruteforce-password-cracker wordlist-technique
Stars: ✭ 86 (-51.14%)
Mutual labels:  hacking
Offensive Dockerfiles
Offensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-14.77%)
Mutual labels:  hacking
Container Ioc
Inversion of Control container & Dependency Injection for Javascript and Node.js apps powered by Typescript.
Stars: ✭ 89 (-49.43%)
Mutual labels:  injection
Elf Strings
elf-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings UNIX utility, however is purpose built for ELF binaries.
Stars: ✭ 127 (-27.84%)
Mutual labels:  reverse-engineering
Ble Security Attack Defence
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Stars: ✭ 88 (-50%)
Mutual labels:  hacking
Umbrella android
Open source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-2.84%)
Mutual labels:  hacking
Shellpop
Pop shells like a master.
Stars: ✭ 1,279 (+626.7%)
Mutual labels:  hacking
Dnspy.extension.holly
A dnSpy extension to aid reversing of obfuscated assemblies
Stars: ✭ 127 (-27.84%)
Mutual labels:  reverse-engineering
Despector
Java / Kotlin Decompiler and AST Library
Stars: ✭ 126 (-28.41%)
Mutual labels:  reverse-engineering
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-51.14%)
Mutual labels:  hacking
Frida Ios Dump
pull decrypted ipa from jailbreak device
Stars: ✭ 2,223 (+1163.07%)
Mutual labels:  reverse-engineering
Samsung Trustzone Research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
Stars: ✭ 85 (-51.7%)
Mutual labels:  reverse-engineering
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-28.41%)
Mutual labels:  hacking
Jenkins Shell
Automating Jenkins Hacking using Shodan API
Stars: ✭ 84 (-52.27%)
Mutual labels:  hacking
Hackercamp
Enine boyuna siber güvenlik
Stars: ✭ 149 (-15.34%)
Mutual labels:  hacking
Dotnettency
Mutlitenancy for dotnet applications
Stars: ✭ 100 (-43.18%)
Mutual labels:  injection
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+995.45%)
Mutual labels:  hacking
Flare Ida
IDA Pro utilities from FLARE team
Stars: ✭ 1,374 (+680.68%)
Mutual labels:  reverse-engineering
Hackerone Lessons
Transcribed video lessons of HackerOne to pdf's
Stars: ✭ 101 (-42.61%)
Mutual labels:  hacking
Z3 and angr binary analysis workshop
Code and exercises for a workshop on z3 and angr
Stars: ✭ 154 (-12.5%)
Mutual labels:  reverse-engineering
Intelspy
Perform automated network reconnaissance scans
Stars: ✭ 134 (-23.86%)
Mutual labels:  hacking
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-42.61%)
Mutual labels:  hacking
Jebscripts
A set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100 (-43.18%)
Mutual labels:  reverse-engineering
Awesome Csirt
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-25%)
Mutual labels:  reverse-engineering
241-300 of 1078 similar projects