BONOMEN - Hunt for Malware Critical Process Impersonation
☆50Nov 30, 2020Updated 5 years ago
Alternatives and similar repositories for bonomen
Users that are interested in bonomen are comparing it to the libraries listed below
Sorting:
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Apr 3, 2020Updated 5 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- Snifter is a raw socket IP packet capturing library/app for Windows, with a tiny CPU and memory footprint☆44Nov 6, 2020Updated 5 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 8 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Feb 13, 2017Updated 9 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Feb 2, 2018Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆14May 20, 2019Updated 6 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆270Jun 15, 2021Updated 4 years ago
- Repo for software related to Software Systems at Olin College.☆13Oct 5, 2015Updated 10 years ago
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago