Fmk0 / scripts
☆102Updated 5 years ago
Alternatives and similar repositories for scripts:
Users that are interested in scripts are comparing it to the libraries listed below
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆82Updated 4 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago
- Simple DDE object detector☆55Updated 7 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago
- ☆134Updated 6 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- ☆105Updated 3 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆144Updated 9 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 5 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆81Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- ☆113Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆159Updated 5 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆141Updated 4 years ago
- JavaScript Reversed TCP Meterpreter Stager☆136Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Updated 6 years ago
- Pypykatz server☆124Updated 5 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆147Updated 6 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago