ssloxford / livingoffthelandView external linksLinks
Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land
☆11Jul 7, 2021Updated 4 years ago
Alternatives and similar repositories for livingofftheland
Users that are interested in livingofftheland are comparing it to the libraries listed below
Sorting:
- Code for "Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating"☆11Nov 29, 2021Updated 4 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- ☆25Jun 25, 2021Updated 4 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆11Mar 7, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- 利用QT编写一个QQ聊天程序☆10Jun 1, 2021Updated 4 years ago
- Simulation-based Digital Twin for Production and Logistics Material Flows☆24Jan 5, 2026Updated last month
- ☆11Feb 19, 2023Updated 2 years ago
- ☆11Jul 8, 2024Updated last year
- The Network File Extractor☆11Feb 27, 2014Updated 11 years ago
- Spring-Cloud-Spel-RCE☆12Sep 16, 2022Updated 3 years ago
- Sample Industry 4.0 Asset Administration Shell API for Azure Digital Twins☆21Mar 13, 2023Updated 2 years ago
- ☆13Jan 22, 2025Updated last year
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆12Jul 7, 2024Updated last year
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 7 months ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- ☆18Dec 1, 2024Updated last year
- ☆11Nov 21, 2020Updated 5 years ago
- ☆10Nov 13, 2022Updated 3 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Introduction to Machine Learning with Time Series workshop☆14Nov 3, 2023Updated 2 years ago
- System traces dataset generation tool.☆14Mar 18, 2022Updated 3 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Nov 1, 2021Updated 4 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆360Nov 10, 2022Updated 3 years ago
- NJUPT 校园网自动保持登录☆12Nov 13, 2020Updated 5 years ago
- ☆12Jul 26, 2022Updated 3 years ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- Framework to test Ansible roles with serverspec on multiple systems☆13Mar 7, 2022Updated 3 years ago
- 整理容器逃逸相关的漏洞和exploits.☆15Apr 17, 2024Updated last year
- Example payload for CVE-2022-21894☆15Sep 27, 2023Updated 2 years ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- Tools to make life easier ^_^☆13Aug 21, 2025Updated 5 months ago
- huaweictf2020-xctf高校网络安全挑战赛☆17Dec 28, 2020Updated 5 years ago
- 简单的二进制加密壳☆12Aug 2, 2020Updated 5 years ago
- UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation, USENIX Security '24☆12Dec 5, 2024Updated last year