BinaryDefense / GhidraRustDependenciesExtractor
Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary
☆27Updated 2 years ago
Alternatives and similar repositories for GhidraRustDependenciesExtractor:
Users that are interested in GhidraRustDependenciesExtractor are comparing it to the libraries listed below
- Powershell Linter☆50Updated 2 months ago
- ☆25Updated 2 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- Golang bindings for PE-sieve☆42Updated last year
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- General malware analysis stuff☆36Updated 5 months ago
- ☆79Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆20Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- Repo containing my public talks☆22Updated last year
- Windows APT Warfare, published by Packt☆67Updated last year
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆44Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆71Updated 4 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- aggregated repo for all conferences and talks I am giving☆17Updated 3 years ago
- ☆38Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆49Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated 11 months ago
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆33Updated 3 weeks ago
- ☆49Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- Attack chain emulator. Write recipes for initial access easily☆20Updated last year
- Malware Analysis tools☆25Updated 4 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆17Updated this week
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago