Memory dump and Sample analysis tool
☆18Mar 17, 2025Updated last year
Alternatives and similar repositories for deject
Users that are interested in deject are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- Blackbird OSINT tool FrontEnd React Project☆13Mar 6, 2024Updated 2 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Use CMSTP.exe to bypass UAC.☆51Jun 24, 2022Updated 3 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Sep 28, 2021Updated 4 years ago
- Configurations for a vertical 72" PiWall system☆13Jan 21, 2017Updated 9 years ago
- Command-line shell script to download a CRX (chrome extension) for offline installation☆11Apr 20, 2025Updated 11 months ago
- ☆12Apr 22, 2025Updated 11 months ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- Inject scripts into gzipped pages without decompression☆14Feb 4, 2026Updated last month
- Multitool for Windows native find + replace bytes in hex format☆16Jan 22, 2026Updated 2 months ago
- Project web-site☆19Mar 13, 2026Updated last week
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Threat Hijacking Simple Implementation☆20Feb 24, 2025Updated last year
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- Helps generate better emoji assets for the Telegram's Android client.☆11Jan 2, 2019Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Process Creation, Image Load and Thread Creation Notification☆13Sep 15, 2023Updated 2 years ago
- A Go tool to obfuscate and deobfuscate the code and file.☆13May 29, 2022Updated 3 years ago
- Import / Export / Merge tool for your Android/iOS/GV text message history.☆12Apr 14, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year