gyoisamurai / Adversarial-Threat-DetectorView external linksLinks
☆34Apr 25, 2021Updated 4 years ago
Alternatives and similar repositories for Adversarial-Threat-Detector
Users that are interested in Adversarial-Threat-Detector are comparing it to the libraries listed below
Sorting:
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- 以子域名作为基础数据进行分析出关键词,然后基于FoFa、Shodan、Zoomye网络引擎的多维度资产探测脚本☆21Apr 25, 2021Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- Meltdown/Spectre PoC for Windows☆28Mar 21, 2019Updated 6 years ago
- Reverse shell without Windows cmd.exe, using ReactOS cmd.dll as shellcode☆23May 24, 2020Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Jul 12, 2020Updated 5 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- ☆27Jul 29, 2024Updated last year
- Volatility MindMap & Cheat Sheet☆28Feb 6, 2022Updated 4 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- ☆32Aug 16, 2020Updated 5 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 2 months ago
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- client-side prototype pullution vulnerability scanner☆46Aug 23, 2021Updated 4 years ago
- CveXplore☆42Sep 12, 2025Updated 5 months ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- A small tool to patch PE files' import address table with an external payload DLL.☆14Feb 7, 2026Updated last week
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- 在线安软识别☆12Aug 6, 2025Updated 6 months ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 10 months ago
- ☆15Sep 2, 2024Updated last year
- programmatic binary patching using ptrace☆13Aug 9, 2025Updated 6 months ago
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Simple terminal interface for chatgpt☆10Dec 6, 2022Updated 3 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago