hexpresso / WU-2015Links
Writeups for CTF that took place in 2015.
☆13Updated 9 years ago
Alternatives and similar repositories for WU-2015
Users that are interested in WU-2015 are comparing it to the libraries listed below
Sorting:
- Configuration security audit framework☆21Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Plugins for the Volatility framework☆18Updated 9 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Volatility Plugins☆21Updated 10 years ago
- ☆68Updated 8 years ago
- ☆16Updated 10 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Collection of my Python Scripts☆41Updated 4 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Windows Trollware and Persistence Script☆13Updated 9 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- library to decode/parse zeus-like configuration files☆29Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Malware.lu tools☆63Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- ActionScript3 dynamic instrumentation tool☆36Updated 8 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- ☆15Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago