dasec / fishyLinks
Toolkit for Filesystem based Data Hiding Techniques.
☆39Updated 6 years ago
Alternatives and similar repositories for fishy
Users that are interested in fishy are comparing it to the libraries listed below
Sorting:
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- DEbian Cve REproducer Tool☆27Updated 2 months ago
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆49Updated 5 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Updated last year
- Clone of PDFiD by Didier Stevens, as a package and with some improvements.☆42Updated 9 years ago
- Volatility3 plugins developed and maintained by the community☆59Updated 2 years ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆17Updated 7 months ago
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- ☆49Updated 2 months ago
- yet another hidden LKM hunter☆27Updated 2 weeks ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CLI tool to analyze PE files☆88Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- DFF (Digital Forensics Framework)☆11Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 2 years ago
- A FUSE module to mount captured network data☆41Updated 3 months ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Python based CLI for MalwareBazaar☆38Updated 2 months ago
- ☆44Updated last year
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 2 weeks ago