AXI4L / Tools
☆16Updated this week
Related projects: ⓘ
- Static Decryptor for IcedID Malware☆18Updated last year
- aggregated repo for all conferences and talks I am giving☆17Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- Reverse Engineering and Debugging Malware☆28Updated last year
- My Malware Analysis Reports☆18Updated 2 years ago
- ☆23Updated this week
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago
- A fast wordlist to nthash converter☆21Updated 2 years ago
- ☆55Updated this week
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- A small utility to deal with malware embedded hashes.☆48Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆45Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆32Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- ☆11Updated 3 years ago
- Continuous kerberoast monitor☆43Updated last year
- WMI SA stuffs☆28Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆59Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆26Updated 5 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)