BostonCybernetics-Training / GhidraAutomations
Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)
☆18Updated last year
Alternatives and similar repositories for GhidraAutomations:
Users that are interested in GhidraAutomations are comparing it to the libraries listed below
- ☆28Updated 3 weeks ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆51Updated last year
- Powershell Linter☆50Updated 2 weeks ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- ELF Sectional docking payload injector system☆21Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- ☆111Updated this week
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated this week
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆41Updated last year
- ☆46Updated 6 years ago
- ☆35Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆36Updated 3 years ago
- ☆48Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆43Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 3 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- Malware Analysis tools☆25Updated 5 months ago
- Leveraging patch diffing to discover new vulnerabilities☆111Updated 4 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- ☆58Updated 11 months ago
- ☆60Updated 7 months ago
- Writeups for CTF challenges☆30Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆93Updated 5 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆35Updated 2 months ago
- A feed of malware samples curated from threat intelligence sources.☆25Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆101Updated 2 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago