carmaa / interrogate
Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
☆78Updated 5 years ago
Alternatives and similar repositories for interrogate:
Users that are interested in interrogate are comparing it to the libraries listed below
- ☆17Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- See here:☆42Updated 12 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 2 weeks ago
- Spy Agency Teasing☆14Updated 10 years ago
- Basic file metadata gathering script☆21Updated 3 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- A tool to dynamically inspect macro execution in Office documents☆13Updated 8 years ago
- A Volatility plugin for finding sqlite database rows☆22Updated 5 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- ☆14Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- post-exploitation tools☆15Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Dump and parse embedded certificates from Windows binaries☆11Updated 13 years ago
- Lite version of PDF X-RAY that uses no backend☆36Updated 13 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Cryptowall Tooling & Information☆34Updated 9 years ago
- Tools for viewing and extracting HDD firmware files☆72Updated 10 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago