UPX - the Ultimate Packer for eXecutables
☆68Mar 9, 2022Updated 4 years ago
Alternatives and similar repositories for upx-mod
Users that are interested in upx-mod are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 2 years ago
- ☆20Jul 24, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆44Jul 9, 2022Updated 3 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆222Jan 18, 2020Updated 6 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆102Jul 22, 2021Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ETW forensic tool for Volatility3 plugin☆17Nov 15, 2024Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- ☆74Jul 23, 2021Updated 4 years ago
- Beacon Object File PoC implementation of KillDefender☆235Apr 12, 2022Updated 3 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- Bypass Detection By Randomising ROR13 API Hashes☆141Feb 24, 2022Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- wo ee cve-2022-2185 gitlab authenticated rce☆80Jul 29, 2022Updated 3 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110May 24, 2020Updated 5 years ago
- dll proxying☆60Mar 3, 2021Updated 5 years ago
- ☆117Dec 12, 2022Updated 3 years ago
- ☆64Jan 2, 2024Updated 2 years ago
- ☆39Apr 3, 2023Updated 2 years ago
- C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection☆250Mar 31, 2021Updated 4 years ago
- A Python Obfuscator through AST modification☆26Nov 15, 2019Updated 6 years ago
- Patch ELF to unshc —— decrypt and extract script from shc(Shell script compiler)☆16Sep 17, 2025Updated 6 months ago
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- ☆100Mar 31, 2022Updated 3 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago