DissectMalware / npp-langs-4-secLinks
Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals
☆14Updated 5 years ago
Alternatives and similar repositories for npp-langs-4-sec
Users that are interested in npp-langs-4-sec are comparing it to the libraries listed below
Sorting:
- SDBbot Unpacker Python 2.7☆9Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated last year
- Scripts targeting specific families☆13Updated 8 years ago
- ☆24Updated 5 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- ☆22Updated 4 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆11Updated 9 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25Updated 7 years ago
- ActiveMime File Format Documentation☆18Updated 4 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- ☆13Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- TA505 unpacker Python 2.7☆47Updated 5 years ago
- ☆18Updated 6 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- ☆31Updated 4 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- ☆10Updated 8 years ago