g4l4drim / ChromeDumpView external linksLinks
☆55Oct 12, 2024Updated last year
Alternatives and similar repositories for ChromeDump
Users that are interested in ChromeDump are comparing it to the libraries listed below
Sorting:
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆23May 19, 2019Updated 6 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- petit "playbook" qui pourrait servir de base à une réponse à incident lors d'une attaque de type ransomware☆21Aug 30, 2022Updated 3 years ago
- Repo containing my public talks☆23May 30, 2023Updated 2 years ago
- A Python package and command line utility for scanning emails with YARA rules☆21Jan 23, 2026Updated 3 weeks ago
- A Multipath TCP python support library 🐍☆10Feb 5, 2023Updated 3 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTP☆34Apr 29, 2024Updated last year
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆57May 1, 2023Updated 2 years ago
- tenjint is a Python 3-based platform for virtual machine introspection (VMI) on x86 and ARM. This is main Python 3 tenjint library.☆11Feb 9, 2021Updated 5 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Aug 11, 2023Updated 2 years ago
- Forensics artefact collection tool for systems running Microsoft Windows☆431Mar 26, 2025Updated 10 months ago
- ☆46Nov 7, 2024Updated last year
- Landing page for MAEC docs☆22Oct 22, 2022Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated last month
- Extract, gather and analyze information from an Android Manifest file or an APK.☆19Jun 9, 2023Updated 2 years ago
- A library implementing a generic SQL like query language.☆21Sep 15, 2025Updated 5 months ago
- Extract compressed memory pages from page-aligned data☆47Sep 25, 2018Updated 7 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆84Feb 21, 2024Updated last year
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Collection of some personal markdown resources☆21Jan 31, 2019Updated 7 years ago
- ☆27May 6, 2024Updated last year
- IDA's Lumina feature, reimplemented for Binary Ninja☆26Feb 22, 2023Updated 2 years ago
- Démonstrateur de signature de groupes☆21Nov 27, 2023Updated 2 years ago
- Tool and framework for securely reading untrusted USB mass storage devices.☆365Updated this week
- Use YARA rules on Time Travel Debugging traces☆96Jul 11, 2023Updated 2 years ago
- ☆23Jun 24, 2025Updated 7 months ago
- A Dissect module implementing a parser for Microsofts Extensible Storage Engine Database (ESEDB), used for example in Active Directory, E…☆24Nov 20, 2025Updated 2 months ago
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 5 months ago
- ☆19Nov 26, 2020Updated 5 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago