skalkoto / winexeView external linksLinks
☆70May 6, 2018Updated 7 years ago
Alternatives and similar repositories for winexe
Users that are interested in winexe are comparing it to the libraries listed below
Sorting:
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Fork of famous packet sniffer suite☆13Dec 12, 2011Updated 14 years ago
- Code from git://git.code.sf.net/p/winexe/winexe-waf☆11May 3, 2019Updated 6 years ago
- ELK stack for red team logs☆13Oct 30, 2020Updated 5 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Dec 16, 2023Updated 2 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- An offensive Powershell console☆30Dec 5, 2015Updated 10 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆22Jan 24, 2025Updated last year
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆42Mar 1, 2025Updated 11 months ago
- Simple windows backdoor command shell.☆20Dec 4, 2017Updated 8 years ago