snapattack / bpfdoor-scannerLinks
BPFDoor Scanner - Check for Compromised Hosts
☆39Updated 3 years ago
Alternatives and similar repositories for bpfdoor-scanner
Users that are interested in bpfdoor-scanner are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 years ago
- 오펜시브 시큐리티 TTP, 정보, 그리고 대응 방안을 분석하고 공유하는 프로젝트입니다. 정보보안 업계 종사자들과 학생들에게 도움이 되었으면 좋겠습니다.☆61Updated 2 months ago
- A library and cli tool to extract HWP files.☆22Updated 5 months ago
- Tool for analysis of Windows Prefetch files☆26Updated 6 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Updated 2 years ago
- Hardened your Windows OS against forensics analysis☆21Updated 7 months ago
- NTFS file system specimens☆13Updated last year
- KIISC Digital Forensics Challenge 2021 - DogeCoin's WriteUp☆18Updated 2 years ago
- Windows Event Log Knowledge Base☆25Updated 8 months ago
- Script for automating Linux memory capture and analysis☆13Updated 5 years ago
- Learning material for completely newcomers in the field of BOFs☆14Updated 5 years ago
- dForensics Tools☆22Updated 9 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- KIISC Digital Forensics Challenge 2023 - Kimbabasaksaksak's WriteUp☆23Updated last year
- BPFDoor Source Code. Originally found from Chinese Threat Actor Red Menshen☆243Updated 3 years ago
- ☆37Updated 4 months ago
- Renamed to Free EDR to avoid confusion with Comodo's project☆26Updated 2 years ago
- Digitalis's Security Lab☆10Updated 3 years ago
- Linux #rootkit and #malware revealer☆26Updated 10 months ago
- ☆27Updated 3 years ago
- ☆34Updated 2 years ago
- Analysis or research tools for digital forensics☆11Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- Here are some tools I developed to help analyze malware☆11Updated last year
- ☆22Updated 2 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- Yara rules☆22Updated 2 years ago