Cisco-Talos / useful-tools
☆16Updated 2 years ago
Alternatives and similar repositories for useful-tools:
Users that are interested in useful-tools are comparing it to the libraries listed below
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- ☆18Updated 5 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 7 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆34Updated 8 years ago
- ☆22Updated 4 years ago
- ☆32Updated 9 months ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 7 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆17Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 6 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Library for Windows XML Event Log (EVTX) data types☆18Updated 5 months ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- ☆16Updated 7 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago