cecio / EMOTET-2020-Reversing
a State-Machine reversing exercise
☆12Updated 3 years ago
Alternatives and similar repositories for EMOTET-2020-Reversing:
Users that are interested in EMOTET-2020-Reversing are comparing it to the libraries listed below
- ☆12Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆26Updated 3 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 6 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- ☆30Updated 2 years ago
- ☆49Updated 5 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- ActiveMime File Format Documentation☆17Updated 3 years ago
- My scripts to deobfuscate APT32 malware☆26Updated 2 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 6 years ago
- Sources code extracted from malwares for analysis☆36Updated last year
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- ☆27Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Updated 4 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- ☆21Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago