leabhart / MaldocsLinks
Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM, etc.)
☆16Updated 3 years ago
Alternatives and similar repositories for Maldocs
Users that are interested in Maldocs are comparing it to the libraries listed below
Sorting:
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆30Updated 5 years ago
- Local Privilege Escalation Miner☆29Updated 3 years ago
- Work in Progress repo☆14Updated 6 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆15Updated 2 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 11 months ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- ☆27Updated 7 months ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Discord as a C2☆49Updated 4 years ago
- ☆16Updated 5 years ago
- ☆17Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Linux startup analyzer☆65Updated last month
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- My malware analysis code snippets☆27Updated 2 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 5 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated 5 months ago
- MacOSX Privilege Escalation Research☆31Updated 3 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated last year
- x86 Assembly Code Examples for Blog Posts☆17Updated 2 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- ☆20Updated 4 years ago