deadbits / pe-staticView external linksLinks
Static file analysis for PE files
☆13Dec 4, 2020Updated 5 years ago
Alternatives and similar repositories for pe-static
Users that are interested in pe-static are comparing it to the libraries listed below
Sorting:
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- 这是一个 fps 单机游戏逆向练习项目,使用 imgui 绘制。(This is a reverse practice project for fps single player games, drawn using imgui.)☆13Sep 5, 2023Updated 2 years ago
- Powershell Network Scanner☆37Jan 20, 2020Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- Fetch PDB symbols directly from Microsoft's symbol servers☆48Oct 22, 2025Updated 3 months ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- ☆17Jun 30, 2020Updated 5 years ago
- Simple single file header for creating zero imports drivers. Can be useful for bypassing forensic memory analysis performed by anticheats…☆16Jun 10, 2025Updated 8 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 5 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Qubes component: core-qubesdb☆12Jan 12, 2026Updated last month
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Node module to easily lookup city and state for a US zipcode☆14Dec 28, 2013Updated 12 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- High-level library for executable binary file analysis☆16Feb 13, 2017Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Cheat Engine alternative written in Rust☆12Nov 15, 2022Updated 3 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Collection of mods for Total War: Warhammer III☆13Aug 25, 2022Updated 3 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 3 years ago
- PowerShell tools for managing a Hyper-V guarded fabric and shielded virtual machines☆18Sep 20, 2019Updated 6 years ago
- AutoIt Obfuscator (Python module) lets you protect AutoIt script source code against analysis, reverse engineering, and decompilation usi…☆12Nov 27, 2025Updated 2 months ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 7 years ago