G4LB1T / SmoothCriminal
Detect sandbox by cursor movement speed
☆52Updated 2 years ago
Alternatives and similar repositories for SmoothCriminal:
Users that are interested in SmoothCriminal are comparing it to the libraries listed below
- PLASMA PULSAR☆69Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- ☆73Updated 2 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆98Updated 5 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Mixing up CVE and MS like a pro☆24Updated 8 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- some pocs for antivirus evasion☆130Updated last year
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Various config files obtained during malware analysis☆67Updated 6 years ago