Phaeilo / vol-openvpn
A Volatility plugin to extract credentials from the memory of a OpenVPN client.
☆28Updated 10 years ago
Alternatives and similar repositories for vol-openvpn:
Users that are interested in vol-openvpn are comparing it to the libraries listed below
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Some yara rules and tools☆16Updated 10 years ago
- ☆24Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- Extract Typelib Data from portable executables (recursively within a directory)☆12Updated 15 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆38Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated 10 months ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 5 months ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Application for random attack on Green Petya's key☆22Updated 7 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- ☆15Updated 8 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆50Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Data package with attacks against civil society☆13Updated 8 years ago