snapattack / bpfdoor-scanner
BPFDoor Scanner - Check for Compromised Hosts
☆21Updated 2 years ago
Alternatives and similar repositories for bpfdoor-scanner:
Users that are interested in bpfdoor-scanner are comparing it to the libraries listed below
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆27Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 4 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- ☆12Updated 4 years ago
- ☆12Updated 2 years ago
- ☆10Updated 2 years ago
- ☆24Updated 3 years ago
- Python wrappers for mal_unpack☆36Updated last year
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Updated last year
- ☆23Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- ☆22Updated last year
- Small tool to play with IOCs caused by Imageload events☆42Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- ☆37Updated last month
- ProcDot Malware Sandbox☆24Updated 5 months ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆14Updated last year
- ☆16Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- ☆16Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- Golang bindings for PE-sieve☆43Updated last year
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆27Updated 5 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago