jschicht / StegoMftLinks
PoC for hiding data within $MFT
☆12Updated 11 years ago
Alternatives and similar repositories for StegoMft
Users that are interested in StegoMft are comparing it to the libraries listed below
Sorting:
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 3 months ago
- ☆60Updated last year
- A Microsoft Windows service to provide telemetry on Windows executable memory page changes to facilitate threat detection☆32Updated 5 years ago
- This tool is the result of a reverse engineering process of the Windows service called SysMain. Time to interact with the prefetch files …☆32Updated 5 years ago
- Google Chrome internals analysis using Volatility☆41Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆44Updated 4 years ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- ☆75Updated 2 years ago
- ☆18Updated 5 years ago
- Heappo 🦛 is a PyKD based extensions for WinDBG which aids Heap Exploitation☆14Updated 5 years ago
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- volatility explorer☆92Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- ☆28Updated 6 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Windows Event Log Knowledge Base☆28Updated 2 weeks ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆29Updated 3 weeks ago
- Antivirus Emulator Fingerprints☆30Updated 7 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Updated 2 years ago