FuzzySecurity / BinaryNinja-ThemesLinks
Custom Binary Ninja Themes
☆12Updated last year
Alternatives and similar repositories for BinaryNinja-Themes
Users that are interested in BinaryNinja-Themes are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆12Updated 2 years ago
- x86_64 LKM linux rootkit☆16Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- My nim learning experiments☆11Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Golang Shlyuz Implant Implementation☆13Updated last week
- OSED Practice binary☆24Updated last year
- Ansible build for Afl++ Frida-Mode☆23Updated 11 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14Updated last year
- ☆17Updated last year
- Use WordPress pingback.ping to transfer files.☆17Updated last year
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 2 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- ☆17Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 4 months ago
- ☆18Updated 4 months ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year