aserper / ahk-dumperLinks
Ahk-dumper is a tool to dump AutoHotKey code from the RDATA section of a PE file.
☆20Updated 7 years ago
Alternatives and similar repositories for ahk-dumper
Users that are interested in ahk-dumper are comparing it to the libraries listed below
Sorting:
- Elevation by environment variable expansion☆65Updated 8 years ago
- MS Windows LNK file parser☆12Updated 8 years ago
- ☆29Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Create custom Windows batch files from a configuration file☆32Updated 8 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- This is a Python port of lnk-parse-1.0, a tool to parse Windows .lnk files.☆79Updated 2 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆39Updated 8 years ago
- Basic demo for Hidden Treasure talk.☆49Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 9 years ago
- Memory searching utilities☆42Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- PS / Bash / Python / Other scripts For FUN!☆55Updated 6 months ago
- Emulating Virtual Environment to stay protected against advanced malware☆100Updated 6 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Reflective Polymorphism☆106Updated 7 years ago
- ☆59Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Breaking the security of Microsoft's RMS☆55Updated 6 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- A reference Device Guard code integrity policy consisting of FilePublisher deny rules for published Device Guard configuration bypasses☆115Updated 8 years ago