CounterHack / reversing-crypto-talk-public
☆17Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for reversing-crypto-talk-public
- 504 VSAgent☆23Updated 6 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- ☆17Updated 7 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 7 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 7 years ago
- threadmap plugin for Volatility Foundation☆27Updated 3 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- Use Markov Chains to obfuscate data as other data☆50Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- ☆52Updated 6 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆12Updated 6 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆56Updated 3 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- ☆41Updated 6 years ago
- ☆76Updated 6 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆54Updated 4 months ago
- No-Script Automation Tool☆56Updated 6 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- SEC599 supporting GitHub repository☆15Updated 5 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago