dasec / fishyLinks
Toolkit for Filesystem based Data Hiding Techniques.
☆39Updated 6 years ago
Alternatives and similar repositories for fishy
Users that are interested in fishy are comparing it to the libraries listed below
Sorting:
- yet another hidden LKM hunter☆30Updated 2 months ago
- The Multiplatform Linux Sandbox☆16Updated last year
- DEbian Cve REproducer Tool☆27Updated 3 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 9 months ago
- ☆11Updated 3 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Kiddy - (linux) kernel identity spoofer☆15Updated last year
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆48Updated 9 years ago
- Help deobfuscate VBScript☆16Updated 3 years ago
- Linpmem is a linux memory acquisition tool☆94Updated 5 months ago
- ☆44Updated last year
- Scapy hands-on☆34Updated 2 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 2 months ago
- volatility explorer☆93Updated 5 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- Collection of red machine learning projects☆41Updated 4 years ago
- ☆61Updated last year
- ☆20Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Updated 11 months ago
- Easily scan with multiple yara rules from different sources.☆13Updated last year