armadito / armadito-mod-pdfLinks
Armadito module for PDF document analysis.
☆18Updated 8 years ago
Alternatives and similar repositories for armadito-mod-pdf
Users that are interested in armadito-mod-pdf are comparing it to the libraries listed below
Sorting:
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- ☆26Updated 9 years ago
- ☆32Updated last year
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- ☆43Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- Scanner for the SkeletonKey Malware☆29Updated 10 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- ☆24Updated 10 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- ☆68Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 9 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- ☆16Updated 9 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆48Updated 10 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago