Simple high-interactive client honeypot
☆25Oct 15, 2017Updated 8 years ago
Alternatives and similar repositories for starc
Users that are interested in starc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- KVM-based memory access recorder☆20Oct 14, 2018Updated 7 years ago
- gdbserver implementation on BitVisor☆25Nov 8, 2017Updated 8 years ago
- https://github.com/sk2sat/emu のほうで一から作り直ししてます☆24Jul 8, 2017Updated 8 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 7 months ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Jan 18, 2017Updated 9 years ago
- Analyzing Rig Exploit Kit☆49May 17, 2017Updated 8 years ago
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- simple PE parser☆12Mar 14, 2017Updated 9 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- セキュリティ・キャンプ全国大会2020 オンライン B8講義資料☆18Nov 28, 2020Updated 5 years ago
- Nintendo switch debugger for radare2☆13Aug 12, 2018Updated 7 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- ☆31Sep 9, 2019Updated 6 years ago
- Unofficial website of security camp☆14Aug 19, 2025Updated 7 months ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- 簡単に構築可能で、シンプルな機能で動作を把握しやすくした、サーバ側低対話型の入門用 Web ハニーポット。☆81Jun 21, 2020Updated 5 years ago
- C++ library for detecting Visual C++ runtimes on Windows XP and later.☆19Jul 7, 2014Updated 11 years ago
- A Pictorial Book of Tor Hidden Services.☆26Dec 1, 2017Updated 8 years ago
- WinHTTP wrapper and logger☆11Apr 28, 2015Updated 10 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Mar 7, 2022Updated 4 years ago
- A CPU that executes brainf**k language. Can be synthesized on FPGA☆12Jul 28, 2017Updated 8 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- libs2e.so☆19Dec 19, 2020Updated 5 years ago