msuiche / OPCDE
OPCDE Cybersecurity Conference Materials
☆610Updated 4 years ago
Alternatives and similar repositories for OPCDE:
Users that are interested in OPCDE are comparing it to the libraries listed below
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- rVMI - A New Paradigm For Full System Analysis☆354Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,041Updated 3 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆892Updated 3 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,260Updated 3 weeks ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,139Updated last year
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆230Updated last week
- FAME Automates Malware Evaluation☆878Updated last week
- Windows / Linux Local Privilege Escalation Workshop☆1,006Updated 6 years ago
- Reverse Engineering Tutorials☆516Updated 6 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆726Updated 2 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆264Updated 3 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,596Updated 6 years ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated 2 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,170Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,207Updated 4 years ago
- Conference slides and White-papers☆356Updated 5 years ago
- Malware Configuration And Payload Extraction☆751Updated 2 months ago
- Some security related notes☆460Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆284Updated 8 years ago
- A Course on Intermediate Level Linux Exploitation☆993Updated 4 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆465Updated 3 years ago
- A fully functional DanderSpritz lab in 2 commands☆424Updated 5 years ago
- Security, hacking conferences (list)☆514Updated 3 weeks ago
- Files from my DEFCON CTF VM.☆269Updated 8 years ago
- A collection of sources of indicators of compromise.☆837Updated 4 months ago