☆25Jan 26, 2016Updated 10 years ago
Alternatives and similar repositories for LEAP
Users that are interested in LEAP are comparing it to the libraries listed below
Sorting:
- Yara matching in ElasticSearch.☆10Jun 12, 2018Updated 7 years ago
- ASM Bootkit that patches DSE at boot allowing to load unsigned drivers☆14Aug 24, 2025Updated 6 months ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Nov 11, 2016Updated 9 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- ☆13Jan 12, 2022Updated 4 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 7 years ago
- Landing page for MAEC docs☆22Oct 22, 2022Updated 3 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- Tool to view and create Microsoft shim database files (SDB).☆119May 11, 2017Updated 8 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- ☆78May 24, 2018Updated 7 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Shh0ya Kernel Hook Driver☆25Dec 8, 2020Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Example DLL to load from Windows NetShell☆182Sep 26, 2016Updated 9 years ago
- ☆22Sep 9, 2018Updated 7 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- ☆53Oct 27, 2018Updated 7 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Apr 18, 2019Updated 6 years ago
- Abusing Exchange via EWS☆152Sep 14, 2020Updated 5 years ago
- A Windows Event Processing Utility☆47Feb 21, 2018Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Educational winapi keylogger☆20Oct 18, 2014Updated 11 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Slides from out talk at BH IL 2022☆29Mar 21, 2022Updated 3 years ago
- A command line tool for creating malicious outlook rules☆165Dec 11, 2018Updated 7 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- ☆34Apr 14, 2025Updated 10 months ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- ☆23May 19, 2019Updated 6 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 3 months ago