Macmod / malkom
Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets of PE and ELF malware samples.
☆16Updated last year
Alternatives and similar repositories for malkom:
Users that are interested in malkom are comparing it to the libraries listed below
- My nim learning experiments☆11Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Tricard - Malware Sandbox Fingerprinting☆19Updated last year
- ☆12Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆18Updated last week
- ☆17Updated last year
- Tool for obtaining information about PPL processes☆17Updated 11 months ago
- WMI SA stuffs☆29Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆11Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- ECC Public Key Cryptography☆36Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated last year