Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE
☆34Jan 10, 2018Updated 8 years ago
Alternatives and similar repositories for IEEE_Taggant_System
Users that are interested in IEEE_Taggant_System are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CAPE monitor DLLs☆42Dec 3, 2019Updated 6 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆23Oct 18, 2021Updated 4 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- This build has been moved - see README.md☆12Dec 12, 2019Updated 6 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- A cross-platform library for verifying Authenticode signatures☆163Nov 24, 2025Updated 4 months ago
- Miscellaneous old Exploit code and PoCs☆16Oct 1, 2024Updated last year
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- sbt plugin to upload SCIP indexes to Sourcegraph for precise code intelligence☆16Updated this week
- A Mongo-based version of Heimdall (Deprecated)☆11May 1, 2019Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- Landing page for MAEC docs☆23Oct 22, 2022Updated 3 years ago
- my fork of libxml2☆11May 11, 2011Updated 14 years ago
- Windows 7 / 8.1 + Sikuli 1.1.0 compatible version of source for the great tuturial from Mike´s blog☆10Mar 2, 2017Updated 9 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- Simple tool to generate patterns and masks used to find functions in a binary without hard-coding offsets.☆13Nov 21, 2016Updated 9 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- A python interface to access and manage VMware vSphere and ~Horizon View~☆14Oct 18, 2019Updated 6 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- [MIRROR] Templates and scripts to provide Windows and Linux machines with packer and vagrant☆10May 10, 2025Updated 10 months ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- MinimOSD firmware using FrSky SPort telemetry as source☆10Feb 8, 2014Updated 12 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- ☆42Jan 7, 2025Updated last year
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆18Feb 1, 2022Updated 4 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- combining glicol language/audio engine with tidal pattern and strudel js☆16Jun 11, 2022Updated 3 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- COBOLd: Gobblin’ Up COBOL Bugs for Fun and Profit☆10Mar 30, 2018Updated 7 years ago