G4LB1T / SmoothCriminal
Detect sandbox by cursor movement speed
☆52Updated 2 years ago
Alternatives and similar repositories for SmoothCriminal:
Users that are interested in SmoothCriminal are comparing it to the libraries listed below
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆74Updated 2 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Simple DDE object detector☆55Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆99Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- Write Up I write for different CTFs☆12Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- ☆33Updated 7 years ago
- ASERT shared scripts for reversing☆32Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 7 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- ☆30Updated 8 years ago
- All related files and slides for past talks☆44Updated last year
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 6 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago