Phaeilo / vol-openvpnLinks
A Volatility plugin to extract credentials from the memory of a OpenVPN client.
☆28Updated 10 years ago
Alternatives and similar repositories for vol-openvpn
Users that are interested in vol-openvpn are comparing it to the libraries listed below
Sorting:
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Parallel APK analyzer☆51Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- ☆24Updated 10 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- lte security☆41Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆44Updated 8 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Updated 10 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆12Updated 8 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- A repository of scripts and files related to the CryptoWall version 3 threat☆13Updated 9 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated 7 months ago
- ☆38Updated 12 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago