SummitRoute / srepp_serverLinks
Summit Route End Point Protection - Server code
☆12Updated 9 years ago
Alternatives and similar repositories for srepp_server
Users that are interested in srepp_server are comparing it to the libraries listed below
Sorting:
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 11 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Summit Route End Point Protection - Client code☆16Updated 9 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- ☆10Updated 8 years ago
- Malware.lu configuration extractor☆25Updated 11 years ago
- Network detector for Winnti malware☆21Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆24Updated 10 years ago
- Random Code Store☆17Updated 2 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆22Updated 8 years ago
- Analysis PE file or Shellcode☆50Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- Run one process as another under Windows☆11Updated 3 years ago
- ☆21Updated 9 years ago
- ☆30Updated 8 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 10 years ago
- ☆27Updated 3 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆43Updated 9 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆29Updated 11 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- ☆16Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆50Updated last year
- DLL to use the power of Pafish☆32Updated 4 years ago
- Anti-AV compilation☆44Updated 12 years ago