halsten / Duqu-detectorsLinks
Scripts for detecting Duqu drivers and other elements
☆20Updated 13 years ago
Alternatives and similar repositories for Duqu-detectors
Users that are interested in Duqu-detectors are comparing it to the libraries listed below
Sorting:
- LPE exploits for Secret Net and Secret Net Studio☆50Updated 9 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 9 years ago
- File Dissect is a cross-platform framework and UI for analyzing various file formats. It is based on wxWidgets since it provides a native…☆22Updated 10 months ago
- ☆32Updated last year
- Python Application to Reverse Freezing☆36Updated 8 years ago
- The educational Animus malware☆18Updated 5 years ago
- python inspect rootkit tool☆33Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 10 years ago
- Slides from presentations done by ESET researchers☆20Updated 9 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- ☆46Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆17Updated 13 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Dragon Sandbox☆78Updated 12 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 11 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Updated 9 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- Builds json representation of PDF malware sample☆52Updated 14 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Updated 12 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆24Updated 10 years ago
- ☆35Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago