Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)
☆15Oct 10, 2016Updated 9 years ago
Alternatives and similar repositories for ExposingNeutrino
Users that are interested in ExposingNeutrino are comparing it to the libraries listed below
Sorting:
- random scripts for random things☆13Updated this week
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 8 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- ☆28Aug 10, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- YETI is a TAXII implementation☆47May 10, 2019Updated 6 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- AutoStart teamserver and listeners with services☆75Dec 23, 2021Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- GasPot Released at Blackhat 2015☆145Apr 30, 2024Updated last year
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Decryption Tool☆147Mar 4, 2019Updated 7 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆149Jun 27, 2022Updated 3 years ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago