KasperskyLab / triangle_checkLinks
☆524Updated last year
Alternatives and similar repositories for triangle_check
Users that are interested in triangle_check are comparing it to the libraries listed below
Sorting:
- ☆453Updated last year
- ☆524Updated 10 months ago
- BlockBlock provides continual protection by monitoring persistence locations.☆727Updated 7 months ago
- macOS Malware Collection☆603Updated 2 months ago
- IPSW Diffs☆523Updated last week
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆160Updated 2 months ago
- OS image for the PiRogue based on Debian 12☆161Updated last year
- Experimenting with Apple's WPS location service☆239Updated last month
- GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for …☆860Updated last year
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆796Updated 3 years ago
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆455Updated last year
- macOS (& ios) Artifact Parsing Tool☆964Updated this week
- ☆482Updated last year
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆594Updated 2 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆223Updated last year
- Tools for controlling webcam LED on ThinkPad X230☆496Updated last year
- Forensic toolkit for iOS sysdiagnose feature☆239Updated 3 weeks ago
- ☆273Updated 8 months ago
- A list of public attacks on BitLocker☆396Updated 4 months ago
- A cross platform parser for Apple UnifiedLogs!☆299Updated last month
- Using your Apple device as an access card in unsupported systems☆440Updated 10 months ago
- Like AutoRuns ...but for macOS!☆621Updated this week
- Tool to find common vulnerabilities in cryptographic public keys☆303Updated last week
- ☆327Updated 2 years ago
- GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers -- USENIX Security'24☆270Updated last year
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,055Updated 2 weeks ago
- A crossplatform mDNS enumeration tool.☆362Updated 3 years ago
- Process Monitor Library (based on Apple's new Endpoint Security Framework)☆482Updated 2 years ago
- Index and collection of MVT compatibile indicators of compromise.☆111Updated 4 months ago
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆191Updated last month