Orange-OpenSource / decretLinks
DEbian Cve REproducer Tool
☆25Updated last year
Alternatives and similar repositories for decret
Users that are interested in decret are comparing it to the libraries listed below
Sorting:
- ☆55Updated 8 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- Linux #rootkit and #malware revealer☆26Updated 10 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- A curated list of argument injection vectors☆41Updated 4 months ago
- Detect and remove the presence of canary tokens☆22Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last month
- ☆115Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆56Updated 3 weeks ago
- Userland exec PoC to be used as attack vector technique☆85Updated 4 months ago
- The core backend server handling API requests and task management☆42Updated this week
- ☆47Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated this week
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Open Source eBPF Malware Analysis Framework☆48Updated 8 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- ☆64Updated last month
- YARI is an interactive debugger for YARA Language.☆88Updated this week
- Scapy hands-on☆34Updated last year
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆72Updated 3 weeks ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆22Updated 7 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- ☆17Updated 10 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- ☆33Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago