edurange / edurange-server
cloud-based interactive security exercises
☆14Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for edurange-server
- ☆12Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆14Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 5 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆34Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 8 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆20Updated 9 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆35Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Tools☆13Updated last year
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 6 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 7 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Plugins for the Volatility framework☆19Updated 9 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Memory forensics of virtualization environments☆45Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago
- Various tools, exploits and other short code snippets☆12Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago