☆14Jan 18, 2020Updated 6 years ago
Alternatives and similar repositories for memparse
Users that are interested in memparse are comparing it to the libraries listed below
Sorting:
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- Azure AD Incident Response☆27Oct 8, 2021Updated 4 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Jun 6, 2023Updated 2 years ago
- ☆14Feb 6, 2026Updated 3 weeks ago
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- 之前的个人wiki。现在用 Blog 的形式来写了。这个wiki就放在这里吧。希望里面的内容能帮助到别人。☆10Apr 2, 2020Updated 5 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 4 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Files used for various testing methodologies.☆13Mar 6, 2017Updated 8 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Solidity CTF challenge from BSides TLV 2022☆14Jul 8, 2022Updated 3 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- Website sources for the Apache Directory website☆10Nov 20, 2025Updated 3 months ago
- A rewrite of the popular altDNS subdomain tool by @infosec-au☆12Feb 28, 2019Updated 7 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- A nice asynchronous anime downloader and task automater for kickassanime.☆10Jul 16, 2022Updated 3 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Just for me, not for you.☆11Jul 3, 2021Updated 4 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆30Jan 13, 2026Updated last month
- Full archive of IndieWeb chat log data files☆16Updated this week
- ☆11Nov 22, 2022Updated 3 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- ☆11Mar 19, 2022Updated 3 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago