Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents
☆23Jan 10, 2017Updated 9 years ago
Alternatives and similar repositories for rtf_exploit_extractor
Users that are interested in rtf_exploit_extractor are comparing it to the libraries listed below
Sorting:
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆22May 25, 2017Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- ☆15Oct 24, 2017Updated 8 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- Experiments related to CVE-2015-3456☆12May 27, 2015Updated 10 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 7 years ago
- Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids of…☆53Feb 28, 2016Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- 小型主动防御引擎☆57Jun 24, 2016Updated 9 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Mar 30, 2014Updated 11 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- 来自Freebuf评论区,一个UEFI马.☆51May 1, 2017Updated 8 years ago
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- ☆18Oct 21, 2016Updated 9 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Oct 6, 2017Updated 8 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago