Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)
☆16Oct 10, 2016Updated 9 years ago
Alternatives and similar repositories for ExposingNeutrino
Users that are interested in ExposingNeutrino are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- random scripts for random things☆13Mar 3, 2026Updated 3 weeks ago
- ☆13May 27, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Collection of urls that e-mail trackers use to see if you opened their mail.☆18Sep 20, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Extracted data & informations from the Conti & TrickBot leaks.☆15Mar 12, 2022Updated 4 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Script to automate setting base level MS Secure score in Office 365☆19Jul 31, 2020Updated 5 years ago
- Search engine postings list with support for compresison☆11May 5, 2017Updated 8 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- Binary tools library write in C☆10Nov 21, 2019Updated 6 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!☆13Jan 24, 2021Updated 5 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Mar 8, 2016Updated 10 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago