Cisco-Talos / useful-toolsLinks
☆16Updated 2 years ago
Alternatives and similar repositories for useful-tools
Users that are interested in useful-tools are comparing it to the libraries listed below
Sorting:
- module for certexfil☆15Updated 2 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- All TMF files that I extracted from Microsoft PDBs.☆12Updated 5 years ago
- ☆22Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 11 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- Basic file metadata gathering script☆21Updated 2 months ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- ☆21Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- radare2 script to help on COM objects reverse engineering☆11Updated 8 years ago
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35Updated 9 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆12Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Server for receiving autorun data from the clients☆13Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Injection of MSIL using Cecil☆12Updated 9 years ago