decalage2 / collisions
Hash collisions and their exploitations
☆9Updated 2 years ago
Alternatives and similar repositories for collisions:
Users that are interested in collisions are comparing it to the libraries listed below
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Automated Payload Test Controller☆9Updated 7 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- ☆12Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 3 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆18Updated last year
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- ☆22Updated 4 years ago
- ☆12Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Decrypt encrypted SonicOSX firmware images☆14Updated 2 months ago
- ☆11Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago