password123456 / CertVerifyLinks
A scanner that files with compromised or untrusted code signing certificates written in python.
☆65Updated 2 years ago
Alternatives and similar repositories for CertVerify
Users that are interested in CertVerify are comparing it to the libraries listed below
Sorting:
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- ☆27Updated 3 years ago
- ☆18Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- ☆27Updated last year
- ☆56Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)☆67Updated 3 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 2 months ago
- Modular malware analysis artifact collection and correlation framework☆54Updated last year
- Malware Analysis tools☆26Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 2 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- Repository for archiving Cobalt Strike configuration☆36Updated last week
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- ☆23Updated 2 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Updated 2 months ago
- A repo to house files for our blogposts on blog.nviso.eu☆75Updated 10 months ago
- ☆39Updated 2 years ago
- A collection of my presentation materials.☆17Updated last year
- ☆12Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆46Updated 2 months ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- ☆35Updated last month
- ☆49Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago