BinaryDefense / GhidraRustDependenciesExtractorLinks
Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary
☆29Updated 2 years ago
Alternatives and similar repositories for GhidraRustDependenciesExtractor
Users that are interested in GhidraRustDependenciesExtractor are comparing it to the libraries listed below
Sorting:
- Keep it secret, keep it safe☆77Updated 4 months ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆45Updated 3 years ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆119Updated 2 years ago
- A PoC packer written in Rust!☆73Updated 3 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆32Updated last year
- General malware analysis stuff☆37Updated 10 months ago
- Powershell Linter☆61Updated last week
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆38Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 3 months ago
- ☆27Updated 7 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Just some Rust process injector POCs, nothing weird.☆80Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆122Updated 9 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 2 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆44Updated 4 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- quASAR: ASAR manipulation made easy☆38Updated 2 years ago
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- ☆69Updated last year
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆19Updated 5 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆100Updated last year