nao-sec / starcLinks
Simple high-interactive client honeypot
☆24Updated 7 years ago
Alternatives and similar repositories for starc
Users that are interested in starc are comparing it to the libraries listed below
Sorting:
- Analyzing Rig Exploit Kit☆50Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Analysis PE file or Shellcode☆49Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Updated 7 years ago
- Memory forensics of virtualization environments☆47Updated 10 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- ☆24Updated 7 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- QEMU with rVMI extensions☆25Updated 7 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆35Updated 5 years ago
- Simple NTFS crawler.☆56Updated 7 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Updated 7 years ago
- Anti live forensic linux LKM rootkit☆17Updated 8 years ago
- a collection of yara rules for binary analysis☆24Updated 7 years ago
- ☆43Updated 7 years ago
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Updated 9 years ago
- ☆32Updated last year
- Linux rootkit experimentations☆19Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 8 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆50Updated 7 years ago
- An implementation of a generic unpacker based on Intel PIN☆28Updated 8 years ago
- Implementation of the DIMVA 2017 publication "Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps"☆69Updated 3 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago