Friday, November 15, 2019
Home Tags DVHMA

Tag: DVHMA

Must Need

IDArling

IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray

IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database...
Nemesis

Nemesis – A Command Line Network Packet Crafting & Injecting Utility

The Nemesis Project is designed to be a command line based, portable human IP stack for UNIX-like and Windows systems. The suite is broken...
Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
Ghostfuscator : The Python Password-Protected Obfuscator

Ghostfuscator : The Python Password-Protected Obfuscator

Ghostfuscator is a obfuscate python scripts making them password-protected using AES Encryption. Usage Just execute...

Tips for Recovering the data easily

Recovering data has been mysterious job for a long time once users lost data and then have to ask some experts to do...
Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File...

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg...
Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....