cappsule / cappsule-doc
☆8Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for cappsule-doc
- Cryptowall Tooling & Information☆34Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆46Updated 3 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆40Updated 9 years ago
- BitErrant☆58Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 8 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆36Updated 7 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 7 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- ☆17Updated 6 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆10Updated 6 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- This is a copy of the Registry Decoder repository from Google Code.☆27Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆12Updated 7 years ago
- A simple, but damn fast sinkhole☆63Updated 2 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 10 years ago
- Full-bin indexation of binary files☆92Updated 6 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- Configuration security audit framework☆23Updated 8 years ago
- ☆20Updated 9 years ago