SPTHvx / ezinesLinks
☆19Updated 2 years ago
Alternatives and similar repositories for ezines
Users that are interested in ezines are comparing it to the libraries listed below
Sorting:
- ☆72Updated last year
- ☆122Updated 3 weeks ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Powershell Linter☆86Updated last month
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Updated 4 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 11 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 11 months ago
- Windows APT Warfare, published by Packt☆76Updated 2 years ago
- ☆180Updated 9 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 2 months ago
- ☆105Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- ☆74Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- Linux process injection PoCs☆29Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- ☆39Updated last year
- Recon 2023 slides and code☆80Updated 2 years ago
- ☆250Updated 7 months ago
- Tools for analyzing EDR agents☆276Updated last year
- This is practice VM for malware development☆179Updated 2 months ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Updated 9 months ago
- ☆156Updated 9 months ago
- ☆48Updated 7 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago