reverseame / modexLinks
Volatility 3 plugins to extract a module as complete as possible
☆12Updated last year
Alternatives and similar repositories for modex
Users that are interested in modex are comparing it to the libraries listed below
Sorting:
- A C# Tool to gather information about email breaches☆14Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- ☆12Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 7 months ago
- ☆18Updated 6 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆17Updated last year
- ☆22Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆24Updated 2 years ago
- Powershell Scripts for Blue Team members☆12Updated last year
- Tool for obtaining information about PPL processes☆17Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated 2 years ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated last month
- ECC Public Key Cryptography☆37Updated last year