0xCD4 / ProjectsLinks
☆19Updated 2 years ago
Alternatives and similar repositories for Projects
Users that are interested in Projects are comparing it to the libraries listed below
Sorting:
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- ☆19Updated 5 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Updated 3 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- ☆22Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- hiding in plain sight: part 2☆44Updated last year
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- ☆12Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- ☆17Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated last year
- ☆27Updated 3 years ago
- ☆49Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year