DissectMalware / PySameSame
This is a python version of samesame repo to generate homograph strings
☆23Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for PySameSame
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- ☆22Updated 3 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 5 years ago
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Crack your macros like the math pros.☆33Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆14Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- ☆17Updated 9 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- ☆12Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A Maltego transform for VirusTotal Submitter Information☆31Updated 5 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆23Updated 8 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆44Updated 7 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- ☆30Updated 6 years ago