scrapped ideas and garbage code
☆13May 8, 2021Updated 4 years ago
Alternatives and similar repositories for asdf
Users that are interested in asdf are comparing it to the libraries listed below
Sorting:
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- ☆10Oct 13, 2020Updated 5 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Jan 31, 2019Updated 7 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆17Mar 2, 2018Updated 8 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- 快速搭建各种漏洞环境(Various vulnerability environment) https://hub.docker.com/r/medicean/vulapps/☆19Sep 9, 2017Updated 8 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- An interactive command-line deauther for macOS.☆73Jan 18, 2019Updated 7 years ago
- Find strings in Go binaries☆55Sep 16, 2019Updated 6 years ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Nov 13, 2024Updated last year
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- A very tiny PHP shell☆27Jan 26, 2012Updated 14 years ago
- ☆28Dec 7, 2016Updated 9 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- With the growth of mobile devices and applications, the number of malicious software, or malware, is rapidly increasing in recent years, …☆23Jul 30, 2019Updated 6 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Python AI Slop Detector - Find over-engineering, hallucinations, and dead code in Python codebases☆74Dec 30, 2025Updated 2 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆63Updated this week
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- ☆64Apr 1, 2021Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆34Jan 9, 2023Updated 3 years ago