MarginResearch / resources
☆23Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for resources
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆27Updated last month
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Updated 3 months ago
- Phunter is an osint tool allowing you to find various information via a phone number 🔎📞☆14Updated 7 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- SecurityBsides Roma Conference Repo☆10Updated last year
- ☆28Updated last year
- Repo for all my exploits/PoCs☆27Updated 2 months ago
- ☆25Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆35Updated 9 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- ☆29Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 6 months ago
- ☆24Updated 10 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 4 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 5 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 9 months ago
- APK Infrastructure Investigator☆63Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆31Updated last year
- CVE-2013-4786 Go exploitation tool☆37Updated last year
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆23Updated last month
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated 7 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago