gerryamurphy / Foremost
Foremost is a console program to recover files based on their headers, footers, and internal data structures
☆18Updated 7 years ago
Alternatives and similar repositories for Foremost:
Users that are interested in Foremost are comparing it to the libraries listed below
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆37Updated 7 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆45Updated last year
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆72Updated last year
- Right-To-Left Override POC☆34Updated 3 years ago
- ☆62Updated 3 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Some security by obscurity using port-jumping.☆14Updated 3 weeks ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆116Updated 6 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 3 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆18Updated 4 months ago
- ☆17Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 5 months ago
- Anti-analysis tool that obfuscates ELF files☆28Updated 4 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 10 months ago
- Notes some analysis related to VidarStealer sample☆14Updated 10 months ago
- ☆33Updated 2 years ago
- ☆15Updated last month
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 8 months ago
- Proof-of-concept modular implant platform leveraging v8☆51Updated 3 weeks ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated last year
- ysoserial.net docker image☆28Updated 6 months ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆53Updated 11 months ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Docker image gathering packers and tools for making datasets of packed executables and training machine learning models for packing detec…☆54Updated last week
- ☆28Updated last year
- ☆24Updated last year
- Make an Linux Kernel rootkit visible again.☆49Updated last month