inversecos / ios-moneymachine
☆25Updated 2 years ago
Alternatives and similar repositories for ios-moneymachine:
Users that are interested in ios-moneymachine are comparing it to the libraries listed below
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 2 months ago
- General malware analysis stuff☆36Updated 7 months ago
- ☆10Updated 2 years ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆22Updated 3 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆34Updated 8 months ago
- ☆25Updated 4 months ago
- ☆18Updated 2 months ago
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆50Updated 3 weeks ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆24Updated 4 years ago
- ☆38Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- CSharp4Pentesters☆12Updated 3 years ago
- dontpopme bitches☆23Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Lena's scripts/code/resources for malware analysis☆25Updated 9 months ago
- ☆33Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- ☆48Updated last year
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- Reverse Engineering and Debugging Malware☆30Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆24Updated 7 months ago
- IDA Python scripts☆30Updated last year
- ☆59Updated last year
- ☆25Updated 4 months ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year