dasec / fishyLinks
Toolkit for Filesystem based Data Hiding Techniques.
☆39Updated 6 years ago
Alternatives and similar repositories for fishy
Users that are interested in fishy are comparing it to the libraries listed below
Sorting:
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆51Updated 6 months ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 9 months ago
- DEbian Cve REproducer Tool☆27Updated last month
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- Skeleton project for your own GRUB-based bootkit☆17Updated 6 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Silly proof-of-concept for a PDF chatroom☆20Updated 2 years ago
- Kiddy - (linux) kernel identity spoofer☆15Updated last year
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- yet another hidden LKM hunter☆29Updated 4 months ago
- DFF (Digital Forensics Framework)☆11Updated 5 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆51Updated 9 years ago
- CLI tool to analyze PE files☆90Updated last year
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- YARA Language Server☆75Updated last week
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Updated 4 months ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 5 years ago