rj-chap / ExposingNeutrinoView external linksLinks
Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)
☆15Oct 10, 2016Updated 9 years ago
Alternatives and similar repositories for ExposingNeutrino
Users that are interested in ExposingNeutrino are comparing it to the libraries listed below
Sorting:
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- random scripts for random things☆13Mar 11, 2025Updated 11 months ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆48Nov 3, 2025Updated 3 months ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- ☆29Feb 25, 2017Updated 8 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Dec 21, 2023Updated 2 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- YETI is a TAXII implementation☆47May 10, 2019Updated 6 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- AutoStart teamserver and listeners with services☆75Dec 23, 2021Updated 4 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 5 months ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- Routino is an application for finding a route between two points using the dataset of topographical information collected by http://www.O…☆15Feb 17, 2012Updated 13 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 2 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆150Jun 27, 2022Updated 3 years ago
- Objective C dylibHijackScanner and analysis tool☆38Jul 12, 2023Updated 2 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- ☆74Jul 13, 2022Updated 3 years ago