n1ght-w0lf / UchihashView external linksLinks
A small utility to deal with malware embedded hashes.
☆53Sep 21, 2023Updated 2 years ago
Alternatives and similar repositories for Uchihash
Users that are interested in Uchihash are comparing it to the libraries listed below
Sorting:
- Malware dynamic instrumentation tool based on frida framework☆110Jun 7, 2020Updated 5 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Oct 21, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Oct 3, 2021Updated 4 years ago
- PyDelta is a Python script designed to obfuscate Python source code, making it more difficult to understand and reverse-engineer.☆13Jul 13, 2024Updated last year
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Nexus Repository Manager3 - 远程执行代码漏洞回显payload☆13Sep 29, 2020Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago
- ☆11Oct 17, 2020Updated 5 years ago
- An IDA plugin to deobfuscate Pikabot's strings using RC4 and AES☆13Apr 8, 2024Updated last year
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Nov 14, 2019Updated 6 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- ☆13Oct 29, 2022Updated 3 years ago
- ☆14Sep 13, 2021Updated 4 years ago
- Tool to decrypt the configuration of NanoCore and dump all used plugins☆12Dec 8, 2020Updated 5 years ago
- SendToXray - Burp Suite Extender, Send HTTP request to XRAY proxy.☆11May 22, 2021Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Core A2P2V functionality (command line based)☆68May 14, 2024Updated last year
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Jun 11, 2015Updated 10 years ago