☆12Jun 29, 2021Updated 4 years ago
Alternatives and similar repositories for DeltaFlare
Users that are interested in DeltaFlare are comparing it to the libraries listed below
Sorting:
- Mobile phone PWN tools and scripts☆15Sep 20, 2020Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- ☆23Mar 17, 2024Updated last year
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- service location protocol amplified denial of service attack verification tool☆16Apr 25, 2023Updated 2 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- ☆18Mar 26, 2024Updated last year
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- ☆16Apr 30, 2024Updated last year
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- Creating a ransomware in a minute☆30Apr 25, 2023Updated 2 years ago
- Reverse shell using Windows Registry files (.reg)☆18Apr 7, 2020Updated 5 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- A small utility to deal with malware embedded hashes.☆53Sep 21, 2023Updated 2 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Mar 22, 2020Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Extension blocks as found in ShellBags and other places in the Registry☆25Jan 7, 2025Updated last year
- NTFS samples☆27Aug 1, 2020Updated 5 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Oct 18, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Sep 15, 2025Updated 5 months ago