srozb / mirai-utils
reveal xored strings in mirai binary
☆12Updated 6 years ago
Alternatives and similar repositories for mirai-utils:
Users that are interested in mirai-utils are comparing it to the libraries listed below
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 5 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- ☆11Updated 8 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- ssdeep cluster analysis for malware files☆30Updated 4 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- various slides and presentations I've worked on☆18Updated last month
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Gandcrab v5.2 decryption scripts☆15Updated 5 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- web based nmap scan collection and search☆19Updated 3 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- ☆20Updated 5 years ago
- ☆50Updated 5 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆45Updated 7 years ago
- ☆24Updated 9 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago