h4sh5 / DumpIt-mirror
memory dump tool mirror for version 3.0.20171228.1
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for DumpIt-mirror
- Open-source file scanner that sends requests and optionally uploads files to OpenTIP.kaspersky.com.☆18Updated last year
- decrypting winrm traffic using password/ntlm hash, repo fork from https://gist.github.com/jborean93/d6ff5e87f8a9f5cb215cd49826523045/☆15Updated 3 years ago
- A ptrace-based TLS 1.2 master secret extractor for reverse engineering (PoC)☆26Updated 8 months ago
- MalDev & AV-EDR Evasion for Pentesters☆12Updated last year
- Detection Rule License (DRL)☆15Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆53Updated 6 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Updated 4 months ago
- volatility explorer☆90Updated 4 years ago
- ☆34Updated last year
- With the help of this automated script, you will never lose track of recently released CVEs.☆52Updated 2 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Collection of YARA rules designed for usage through VirusTotal.com.☆65Updated 7 months ago
- This repo contains specific configuration files for better understanding of sysmon configuration on Linux systems.☆13Updated 3 years ago
- Linpmem is a linux memory acquisition tool☆74Updated 6 months ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Updated 3 years ago
- Jupyter Kernel for CodeQL☆14Updated last year
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- dontpopme bitches☆20Updated 2 years ago
- Basic RDP honeypot script☆28Updated last year
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆11Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- QuasarRAT analysis tools and research report☆25Updated 11 months ago
- Notes some analysis related to VidarStealer sample☆14Updated 6 months ago
- 不定期更新suricata的检测规则☆11Updated 4 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆49Updated last year
- Scans through registry hives outputting entropy values for key/values, dumps binary contents to files...we are looking for those "fileles…☆11Updated 5 years ago
- ☆21Updated 3 years ago
- ☆19Updated last year