CounterHack / mandrake
A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021
☆26Updated 2 years ago
Alternatives and similar repositories for mandrake:
Users that are interested in mandrake are comparing it to the libraries listed below
- Tools for offensive security of NetBackup infrastructures☆38Updated last year
- C# User Simulation☆32Updated 2 years ago
- ☆24Updated 11 months ago
- My python3 implementation of a Forward Shell☆35Updated 5 years ago
- ☆15Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Radare2 Metadata Extraction to Elasticsearch☆21Updated 7 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- ☆59Updated 6 months ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆27Updated last year
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated 10 months ago
- Tricard - Malware Sandbox Fingerprinting☆19Updated last year
- Imphash-like calculation on Golang binaries☆49Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- Collection of red machine learning projects☆39Updated 3 years ago
- various slides and presentations I've worked on☆18Updated 10 months ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆21Updated last year
- In 'n Out - See what goes in and comes out of PEs☆33Updated 2 years ago
- Continuous kerberoast monitor☆44Updated last year
- ☆31Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆24Updated last year
- wordlists for password cracking☆25Updated 2 years ago
- ☆15Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- ☆17Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago