mandiant / win10_auto
☆24Updated 5 years ago
Alternatives and similar repositories for win10_auto:
Users that are interested in win10_auto are comparing it to the libraries listed below
- Rekall Memory Forensic Framework☆31Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Library for Windows XML Event Log (EVTX) data types☆17Updated 4 months ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆52Updated 2 years ago
- ☆28Updated 3 months ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- ☆15Updated 4 years ago
- Green shellcode challenge tools☆22Updated 5 years ago
- ☆31Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Utilities for working with vivisect☆25Updated last month
- ☆22Updated 4 years ago
- ☆13Updated 4 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- ☆21Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- ☆36Updated 5 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- An opensource API hooking framework☆21Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago