Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.
☆17Nov 29, 2017Updated 8 years ago
Alternatives and similar repositories for PeddleCheap
Users that are interested in PeddleCheap are comparing it to the libraries listed below
Sorting:
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- SQL scripts for querying event logs☆21Jul 12, 2017Updated 8 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Jan 4, 2019Updated 7 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Nov 9, 2018Updated 7 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- execute remote cmd with smb like psexec☆45May 17, 2013Updated 12 years ago
- Pure Python parser for data encoded by .NET's BinaryFormatter☆54Sep 4, 2018Updated 7 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 3 months ago
- ☆27Feb 6, 2022Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Clone of the IDAPython repo☆23Mar 16, 2015Updated 10 years ago
- A DLL that performs IAT hooking☆27Jul 6, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 9 months ago
- ☆53Mar 4, 2019Updated 6 years ago
- The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-e…☆335Jun 23, 2018Updated 7 years ago
- A repository of example plugins for Relyze Desktop.☆34Apr 17, 2020Updated 5 years ago
- A plugin for the commercial IDA Pro disassembler that warns users if they leave their instance idling for too long.☆31Feb 17, 2026Updated last week
- Repository for Insomni'hack finals 2015☆22Mar 30, 2015Updated 10 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- Misc. PowerShell scripts☆120Jul 4, 2016Updated 9 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- VirtualBox Disk Image Encryption password cracker☆31Oct 6, 2015Updated 10 years ago