aaronbloomfield / dadaLinks
A repo for UVa's CS 4630, Defense Against the Dark Arts course
☆18Updated 8 years ago
Alternatives and similar repositories for dada
Users that are interested in dada are comparing it to the libraries listed below
Sorting:
- scrapped ideas and garbage code☆13Updated 4 years ago
- ☆18Updated 5 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 3 years ago
- Presentations from the CX Security Labs team☆35Updated 6 months ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Updated 2 years ago
- ☆18Updated 6 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Updated 2 years ago
- ☆25Updated 3 years ago
- ☆15Updated 2 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆19Updated 6 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Updated last year
- Help deobfuscate VBScript☆18Updated 3 years ago
- ☆20Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- ☆21Updated 5 years ago
- Simple WebSocket fuzzer☆32Updated 2 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Updated 2 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated 2 months ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 4 years ago
- ☆16Updated last year
- ☆30Updated 6 months ago
- ☆16Updated 4 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Rootkit Arsenal 2nd Source Code☆15Updated 12 years ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 3 years ago