quangnh89 / sinkhole-gateway
☆11Updated 8 years ago
Alternatives and similar repositories for sinkhole-gateway
Users that are interested in sinkhole-gateway are comparing it to the libraries listed below
Sorting:
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆21Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- ☆43Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 7 years ago
- ☆15Updated 4 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- ☆36Updated 5 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- ☆43Updated 5 years ago
- ☆51Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- ASERT shared scripts for reversing☆32Updated 7 years ago
- ☆22Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- PyCommands for Immunity Debugger☆27Updated 12 years ago