malwarenights / rebox
Prepare sandbox for the reverse engineering of malware
☆13Updated 5 years ago
Alternatives and similar repositories for rebox:
Users that are interested in rebox are comparing it to the libraries listed below
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆27Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆26Updated 2 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ☆18Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Work in Progress repo☆14Updated 6 years ago
- Different code-injections techniques under a common tool☆30Updated 4 years ago
- DNS File EXfiltration☆46Updated last year
- Alphanumeric Encoder☆25Updated 6 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- isodump - ISO dump utility☆40Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- ☆47Updated 4 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- ☆49Updated 2 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Ghidra plugin for https://analyze.intezer.com☆70Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago