1d8 / analyses
☆13Updated 4 years ago
Alternatives and similar repositories for analyses:
Users that are interested in analyses are comparing it to the libraries listed below
- module for certexfil☆15Updated 2 years ago
- ☆20Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- ☆13Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- ☆24Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- ☆10Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆13Updated 7 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- C# code to run PIC using CreateThread☆16Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- ☆15Updated 4 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- SSDP Service Discovery☆16Updated 6 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago