This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.
☆43Jun 19, 2021Updated 4 years ago
Alternatives and similar repositories for DerbyCon-2019Files
Users that are interested in DerbyCon-2019Files are comparing it to the libraries listed below
Sorting:
- ☆21Jul 27, 2020Updated 5 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Dump configuration from STOP Djvu ransomware sample☆12Feb 19, 2020Updated 6 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- A Chrome cookie dumping utility☆46Feb 21, 2020Updated 6 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- go实现的各种字符串匹配算法☆18Jun 21, 2017Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- ☆58Aug 31, 2018Updated 7 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- bypass BeaconEye☆89Sep 9, 2021Updated 4 years ago
- ☆28Mar 26, 2020Updated 5 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Oct 21, 2017Updated 8 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- ☆16Jun 22, 2020Updated 5 years ago
- ☆15Aug 20, 2019Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- PC端渗透工具☆15Jun 19, 2018Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- IDA Pro loader module for Infineon/Intel-based iPhone baseband firmwares☆25Apr 19, 2012Updated 13 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- check cs yara rules☆42Sep 7, 2021Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆141Jun 25, 2020Updated 5 years ago
- shellcode 异或加密并生成dll☆250Jul 6, 2020Updated 5 years ago
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆83Sep 27, 2018Updated 7 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- ☆15Nov 25, 2021Updated 4 years ago