Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.
☆51Apr 9, 2019Updated 6 years ago
Alternatives and similar repositories for MemoryDecompression
Users that are interested in MemoryDecompression are comparing it to the libraries listed below
Sorting:
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- USN to JSON☆22Apr 4, 2020Updated 5 years ago
- ☆32Feb 7, 2018Updated 8 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- ☆48Jul 7, 2020Updated 5 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- Repository for LNK stuff☆31Aug 31, 2022Updated 3 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 6 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- The content of this repository aims to assist efforts on analysing inner working principles, functionalities, and properties of the Micro…☆150May 29, 2020Updated 5 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- Page File analysis tools.☆131Dec 3, 2015Updated 10 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Dec 8, 2020Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- ☆18Dec 24, 2018Updated 7 years ago
- Extract compressed memory pages from page-aligned data☆47Sep 25, 2018Updated 7 years ago
- Adds a user-mode asynchronous procedure call (APC) object to the APC queue of the specified thread and spoof the Parent Process.☆158Jun 10, 2019Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆117May 23, 2019Updated 6 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Enumerate Windows Defender threat families and dump their names according category☆93May 27, 2019Updated 6 years ago