aserper / ahk-dumperLinks
Ahk-dumper is a tool to dump AutoHotKey code from the RDATA section of a PE file.
☆20Updated 7 years ago
Alternatives and similar repositories for ahk-dumper
Users that are interested in ahk-dumper are comparing it to the libraries listed below
Sorting:
- ☆29Updated 9 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- Create custom Windows batch files from a configuration file☆32Updated 9 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- ☆59Updated 6 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- PS / Bash / Python / Other scripts For FUN!☆56Updated 8 months ago
- An offensive Powershell console☆30Updated 9 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.☆80Updated 2 years ago
- ☆97Updated 9 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Get email notification when Virus Total has a copy of your binary.☆166Updated 5 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 10 years ago
- Simple DDE object detector☆56Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 9 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 9 months ago
- Emulating Virtual Environment to stay protected against advanced malware☆99Updated 6 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 8 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago