srozb / mirai-utilsLinks
reveal xored strings in mirai binary
☆12Updated 7 years ago
Alternatives and similar repositories for mirai-utils
Users that are interested in mirai-utils are comparing it to the libraries listed below
Sorting:
- ☆11Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Gandcrab v5.2 decryption scripts☆15Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- public exploits☆35Updated 2 years ago
- Main repository to pull all Cisco related projects.☆15Updated 8 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- ☆43Updated 7 years ago
- ☆16Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- import pyd or execute PE all from memory using only pure python code and some shellcode tricks☆73Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- pwntools for go!☆12Updated 6 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- We store attacks and exploits that we've found useful in our research☆13Updated 10 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago