Scripts and rulesets for analysing the Winnti malware
☆24Jul 24, 2019Updated 6 years ago
Alternatives and similar repositories for 2019-winnti-analyse
Users that are interested in 2019-winnti-analyse are comparing it to the libraries listed below
Sorting:
- ☆12Sep 2, 2024Updated last year
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Jul 29, 2018Updated 7 years ago
- analysis of EDO soil moisture anomaly maps☆19Dec 4, 2022Updated 3 years ago
- Empfehlungen für die Veröffentlichung von Open Source-Projekten bei BR Data☆26Jan 31, 2020Updated 6 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- How to use machine learning to find interesting places on satellite maps☆53Aug 14, 2023Updated 2 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆26Dec 20, 2019Updated 6 years ago
- Nmap Script to scan for Winnti infections☆71May 22, 2018Updated 7 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- iOS project template based on SwiftUI and async/await networking.☆15Dec 20, 2022Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Apr 10, 2019Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Visualize your Google Location History with Leaflet and the Leaflet heatmap plugin☆15Sep 15, 2020Updated 5 years ago
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year
- A PowerShell module for creating and removing Loopback Network Adapters on Windows using Device Conslole (DevCon.exe)☆15Feb 26, 2021Updated 5 years ago
- ☆12Aug 1, 2025Updated 7 months ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- Course material for Law, Order, and Algorithms☆10Feb 8, 2020Updated 6 years ago
- TinyCircuits TinyDuino Processor Board, Model ASM2001☆22Aug 18, 2020Updated 5 years ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- Ring with WS2812 intelligent RGB-LED☆13Mar 23, 2019Updated 6 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 5 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Google Tink's critical Ed25519 bug related to Java "final" keyword☆11Apr 5, 2020Updated 5 years ago
- Dashboard showcasing Conjoint Analysis for the Electric Vehicle Lease Market (as at January 2020) in San Francisco☆15Feb 19, 2020Updated 6 years ago
- OWASP Zed Attack Proxy plugin for py.test☆13Sep 10, 2015Updated 10 years ago
- Board files and example code for the EL Sequencer☆15Jun 27, 2025Updated 8 months ago
- DTMFDuino receives DTMF tones through a MT8870 integrated circuit who converts the analog audio of tones to a binary code understandable …☆17Jan 31, 2013Updated 13 years ago
- Hare-Niemeyer aka. Hamilton or largest remainder method for seat distribution☆13Feb 19, 2024Updated 2 years ago