Skip to content
View AdventuresInMalware's full-sized avatar
  • Airbus D&S
  • Newport, UK

Block or report AdventuresInMalware

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. unpackers unpackers Public

    Unpacking scripts for various packers

    Python 4 1

  2. pycrits pycrits Public

    Forked from crits/pycrits

    Python interface to the CRITs API

    Python

  3. PowerSploit PowerSploit Public

    Forked from PowerShellMafia/PowerSploit

    PowerSploit - A PowerShell Post-Exploitation Framework

    PowerShell

  4. pefile pefile Public

    Forked from erocarrera/pefile

    pefile is a Python module to read and work with PE (Portable Executable) files

    Python

  5. windows-privesc-check windows-privesc-check Public

    Forked from pentestmonkey/windows-privesc-check

    Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems

    Python