aramosf / recoversqlite
recover deleted information from sqlite files.
☆62Updated 8 years ago
Alternatives and similar repositories for recoversqlite:
Users that are interested in recoversqlite are comparing it to the libraries listed below
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Updated 8 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 6 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- ☆30Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆54Updated 7 years ago
- ☆74Updated 2 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆20Updated 9 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Simple DDE object detector☆56Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A python script used to parse the SAM registry hive.☆72Updated 7 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Static and automated/dynamic malware analysis☆46Updated 9 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 9 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- Yara rules☆47Updated 11 years ago