1d8 / analysesLinks
☆13Updated 4 years ago
Alternatives and similar repositories for analyses
Users that are interested in analyses are comparing it to the libraries listed below
Sorting:
- ☆13Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- module for certexfil☆15Updated 3 years ago
- ☆20Updated 4 years ago
- ☆24Updated 5 years ago
- ☆17Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- ☆36Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 9 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- CTF tasks created☆11Updated 2 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- ☆12Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- ☆14Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆14Updated 6 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago