Python script to extract embedded data from binaries generated by SAPIEN Script Packager
☆13Mar 20, 2024Updated last year
Alternatives and similar repositories for unsapien
Users that are interested in unsapien are comparing it to the libraries listed below
Sorting:
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Feb 12, 2022Updated 4 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- This repository contains additional files mentioned in the blog post☆22Feb 26, 2019Updated 7 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated last month
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆20Dec 18, 2025Updated 2 months ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- ☆41Jul 4, 2018Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Apr 22, 2019Updated 6 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- capa explorer for Cutter.☆46Dec 20, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Camera Tablet, replacing a mouse☆10Mar 28, 2017Updated 8 years ago
- Mediatek firmware unpacking/repacking tools☆51Jan 16, 2018Updated 8 years ago
- Go library to parse Executable and Linkable Format (ELF) files.☆52Jun 27, 2024Updated last year
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- Galaxy Note 2 International Varient Device Tree☆11Feb 25, 2020Updated 6 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Fast Python library for decrypting pgp messages☆17Aug 16, 2012Updated 13 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Generates motion, force and torque profiles for electric motor selection.☆14Jul 6, 2023Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- A free antivirus aggregation software like VirusTotal.☆13Dec 3, 2019Updated 6 years ago
- Locality sensitive hash functions for Tensorflow 2.0.☆12Feb 18, 2022Updated 4 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆65Updated this week
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Go implementation of the Peer-to-Peer Streaming Peer Protocol (rfc7574)☆11Sep 24, 2017Updated 8 years ago