☆49Jan 13, 2020Updated 6 years ago
Alternatives and similar repositories for PDBlaster
Users that are interested in PDBlaster are comparing it to the libraries listed below
Sorting:
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- carcass is a Python package to generate python package scaffolding based on best practices☆17Jan 10, 2022Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- BinSequencer is a script designed to find a common pattern of bytes within a set of samples and generate a YARA rule from the identified…☆80Jan 2, 2022Updated 4 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- Scripts and lists to help generate YARA friendly string mutations☆22Apr 9, 2023Updated 2 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45May 29, 2019Updated 6 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- I'll post my custom shellcode I make here!☆22Oct 23, 2019Updated 6 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Disable root checks performed by rootbeer library (for security testing)☆25Oct 20, 2017Updated 8 years ago
- ☆53May 21, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- ☆36Oct 27, 2019Updated 6 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Jan 7, 2013Updated 13 years ago
- run AFL with pintool☆67Feb 24, 2020Updated 6 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆74Jan 12, 2019Updated 7 years ago
- PoC exploit for CVE-2018-5234☆31May 2, 2018Updated 7 years ago
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- Lootbox downloads open directories shared on Twitter.☆35Mar 28, 2021Updated 4 years ago
- promtstd 🤖 - универсальный стандарт для хранения и использования промтов в AI. 📚 Основан на Markdown, обеспечивает легкость чтения и ст…☆12May 2, 2023Updated 2 years ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- CmdDesktopSwitch is a small utility that lists all windows desktops and provides the option to switch between them. This can be used to i…☆35May 27, 2016Updated 9 years ago
- ☆34Jan 1, 2019Updated 7 years ago