cpuu / lmcLinks
Script for automating Linux memory capture and analysis
☆13Updated 5 years ago
Alternatives and similar repositories for lmc
Users that are interested in lmc are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 years ago
- Simple tool to extract icons from a pe file and other useful information☆13Updated 7 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- volatility explorer☆92Updated 5 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- Tool for analysis of Windows Prefetch files☆26Updated 7 years ago
- Small fuzzing library with an example script using it.☆20Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- ☆23Updated 5 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆30Updated 7 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- ELF Sectional docking payload injector system☆21Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- ☆15Updated 4 years ago
- Surface Analysis System on Cloud☆19Updated 2 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 4 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 2 months ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆40Updated 6 months ago
- Repository of Yara rules created by the Stratosphere team☆29Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13Updated 6 years ago
- ☆25Updated 5 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last month
- Public repository for Red Canary Research☆38Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year