Mimikatz embedded as classes
☆28Oct 25, 2021Updated 4 years ago
Alternatives and similar repositories for CoreClass
Users that are interested in CoreClass are comparing it to the libraries listed below
Sorting:
- ☆10Jul 1, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆12Dec 3, 2020Updated 5 years ago
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- A Golang Registry parser☆19Feb 3, 2025Updated last year
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆14Apr 25, 2022Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Python3 script which decrypts files encrypted by flawed Cl0p ELF variant.☆17Feb 6, 2023Updated 3 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Jul 25, 2019Updated 6 years ago
- ☆23Oct 9, 2024Updated last year
- Automating forensic data extraction, reduction, and overall triage of cold disk and memory images.☆21Mar 12, 2019Updated 6 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 7 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Windows Event Log Knowledge Base☆31Dec 23, 2025Updated 2 months ago
- ☆26Mar 3, 2022Updated 3 years ago
- Network discovery tool for cloud environments☆28May 23, 2022Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- This project will guide yout to awareness of injection in almost every window API and process.☆24Mar 30, 2022Updated 3 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Apr 13, 2022Updated 3 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Virtual news production using Tacotron2 and Wav2Lip☆11Nov 14, 2023Updated 2 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Simple example for getting started with eBPF for Windows☆50Feb 23, 2025Updated last year
- miscellaneous codes☆36Sep 24, 2023Updated 2 years ago