cappsule / cappsule-doc
☆8Updated 8 years ago
Alternatives and similar repositories for cappsule-doc:
Users that are interested in cappsule-doc are comparing it to the libraries listed below
- BONOMEN - Hunt for Malware Critical Process Impersonation☆47Updated 4 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Syscall Firewalls for VM Isolation☆11Updated 7 years ago
- Visual Interface heXadecimal dump☆52Updated 8 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆10Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- Usefull snippets / Computer-security oriented☆21Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- Utility to decompress Linux swsusp hibernation file.☆27Updated 3 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- The Alternative Fileless File System☆55Updated 5 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆44Updated 8 years ago
- intel amt honeypot☆18Updated 7 years ago
- 8ball☆18Updated last year
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Linux Application Firewall☆58Updated 4 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- Some yara rules and tools☆16Updated 10 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- Hardened kernel generation - Deprecated☆49Updated 7 years ago
- ☆17Updated 6 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆41Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago