jschicht / StegoMftLinks
PoC for hiding data within $MFT
☆12Updated 10 years ago
Alternatives and similar repositories for StegoMft
Users that are interested in StegoMft are comparing it to the libraries listed below
Sorting:
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- ActiveMime File Format Documentation☆18Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- ☆23Updated 4 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- Google Chrome internals analysis using Volatility☆42Updated 2 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated 9 months ago
- ☆34Updated 2 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆51Updated last year
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆31Updated 4 years ago
- PoC of macho loading from memory☆57Updated 7 months ago
- volatility explorer☆91Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆31Updated 4 years ago
- Tool to manage user privileges☆29Updated 5 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 4 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- ☆56Updated 8 months ago
- Manipulate timestamps on NTFS☆52Updated 10 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- ☆27Updated 3 years ago
- Small visualizator for PE files☆69Updated last year
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- Yaras Random☆20Updated 6 years ago
- ☆19Updated 2 years ago