cecio / EMOTET-2020-ReversingLinks
a State-Machine reversing exercise
☆13Updated 4 years ago
Alternatives and similar repositories for EMOTET-2020-Reversing
Users that are interested in EMOTET-2020-Reversing are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- ☆79Updated 6 months ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- My scripts to deobfuscate APT32 malware☆27Updated 3 years ago
- ☆25Updated 2 years ago
- ☆30Updated 2 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- A curated list of awesome malware analysis tools and resources☆44Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- ☆28Updated 5 years ago
- ☆48Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 6 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- Android Malware Tracker☆29Updated last year
- ☆28Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago