anvilsecure / lookinsidetheboxView external linksLinks
Breaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.
☆89Apr 24, 2020Updated 5 years ago
Alternatives and similar repositories for lookinsidethebox
Users that are interested in lookinsidethebox are comparing it to the libraries listed below
Sorting:
- extract and parse WEVT_TEMPLATEs from PE files☆18Dec 30, 2023Updated 2 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated last year
- ☆24Mar 12, 2025Updated 11 months ago
- USN to JSON☆22Apr 4, 2020Updated 5 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- Looking inside the (Drop) box. Security Analysis of Dropbox. Updated WOOT '13 paper and other goodies.☆329Apr 24, 2020Updated 5 years ago
- Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening☆27May 5, 2022Updated 3 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- An IDA plugin which demangles Rust function names☆35Dec 11, 2023Updated 2 years ago
- 010 template for apfs☆26Feb 26, 2021Updated 4 years ago
- Tools for macOS Forensic Bootable media☆15May 20, 2020Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- File type and mime detection by magic bytes☆11Jul 22, 2022Updated 3 years ago
- Networked based Atari 2600 emulator.☆17Jul 23, 2021Updated 4 years ago
- A simple example of using Windows Hypervisor Platform (WHP)☆12Dec 18, 2020Updated 5 years ago
- Set up a quick and dirty audit log on an SQLite db.☆16May 16, 2013Updated 12 years ago
- Google Filestream Forensic Tool☆22Mar 10, 2022Updated 3 years ago
- ☆22Aug 15, 2023Updated 2 years ago
- ☆26Jun 16, 2025Updated 7 months ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- a DIY flat christmas decoration with a ATtiny25, 20 led´s and a coin cell battery☆26Nov 10, 2020Updated 5 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- An efficient tool for search files, directories, and alternate data streams directly from NTFS image files.☆28Feb 21, 2024Updated last year
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- clean interface for the windows event log☆26Jun 8, 2024Updated last year
- ☆21Aug 12, 2023Updated 2 years ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Write-ups for crackmes and CTF challenges☆53Nov 24, 2022Updated 3 years ago
- Community provided themes for the reverse engineering tool Binary Ninja☆69May 22, 2025Updated 8 months ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 4 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago