SPTHvx / ezinesLinks
☆18Updated 2 years ago
Alternatives and similar repositories for ezines
Users that are interested in ezines are comparing it to the libraries listed below
Sorting:
- ☆126Updated last week
- ☆72Updated last year
- Windows APT Warfare, published by Packt☆75Updated 2 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- Powershell Linter☆86Updated 2 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Updated last year
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Writeups for CTF challenges☆35Updated 2 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆111Updated 4 years ago
- Vibe Malware Triage - MCP server for static PE analysis.☆74Updated 2 months ago
- This is practice VM for malware development☆179Updated 2 months ago
- ☆39Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 11 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 11 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆120Updated last year
- ☆156Updated 9 months ago
- ☆98Updated 4 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- ☆180Updated 9 months ago
- ☆105Updated last year
- Tools for analyzing EDR agents☆277Updated last year
- ☆74Updated last year
- ☆48Updated 8 months ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Updated 9 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆36Updated last year
- Automated environment setup for Bootkit & Rootkit development.☆35Updated 6 months ago
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆124Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Updated 2 years ago