WithSecureLabs / deject
Memory dump and Sample analysis tool
☆12Updated last month
Alternatives and similar repositories for deject:
Users that are interested in deject are comparing it to the libraries listed below
- ☆30Updated 5 months ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- My malware analysis code snippets☆27Updated last year
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- ☆24Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 2 months ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- ☆22Updated last year
- QuasarRAT analysis tools and research report☆27Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- This repository contains multiple exploits I have written for various CVEs and CTFs☆24Updated 10 months ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆66Updated last year
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- A collection of my presentation materials.☆17Updated 11 months ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 2 months ago
- ☆22Updated 11 months ago