Links or additional data to some researches
☆14May 24, 2019Updated 6 years ago
Alternatives and similar repositories for work
Users that are interested in work are comparing it to the libraries listed below
Sorting:
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆35Jan 27, 2025Updated last year
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆19Jun 19, 2023Updated 2 years ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- Dump of this tool I found☆23Sep 1, 2015Updated 10 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Malware management program and tools☆27Dec 16, 2015Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆35Apr 1, 2016Updated 9 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 7 months ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Feb 5, 2018Updated 8 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Mitre chopshop network decoder framework☆30Oct 13, 2025Updated 4 months ago
- X-HOOK | Cheat Loader☆10Mar 6, 2021Updated 4 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- ☆10Aug 18, 2021Updated 4 years ago