aserper / ahk-dumperLinks
Ahk-dumper is a tool to dump AutoHotKey code from the RDATA section of a PE file.
☆20Updated 7 years ago
Alternatives and similar repositories for ahk-dumper
Users that are interested in ahk-dumper are comparing it to the libraries listed below
Sorting:
- Elevation by environment variable expansion☆65Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 8 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆29Updated 9 years ago
- Create custom Windows batch files from a configuration file☆32Updated 8 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- PS / Bash / Python / Other scripts For FUN!☆55Updated 7 months ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.☆80Updated 2 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Emulating Virtual Environment to stay protected against advanced malware☆100Updated 6 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- ☆43Updated 7 years ago
- Files related to our research on ShadowHammer☆23Updated 4 years ago
- CANAPE Network Testing Tool☆34Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- An offensive Powershell console☆30Updated 9 years ago
- ☆59Updated 6 years ago
- VM setup for Malware RE labs☆28Updated 6 years ago