sunwxg / decode_by_libwiresharkLinks
☆18Updated 7 years ago
Alternatives and similar repositories for decode_by_libwireshark
Users that are interested in decode_by_libwireshark are comparing it to the libraries listed below
Sorting:
- 虚拟机带外内存监控☆14Updated 7 years ago
- 基于行为的Ransomware检测原型☆40Updated 7 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Updated 6 years ago
- ☆33Updated 9 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆43Updated 9 years ago
- JEB scripts for Golang executables analysis☆130Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 8 years ago
- ☆25Updated 7 years ago
- ☆26Updated 8 years ago
- Exported from https://code.google.com/archive/p/hookme/☆43Updated 8 years ago
- ☆10Updated 8 years ago
- Anti-ransomware in linux, Decoy, Protect file, Protect drectory, Auto backup☆25Updated 2 years ago
- ☆29Updated 7 years ago
- Security introduction book☆23Updated 9 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- ☆44Updated 5 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆26Updated 2 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Updated 3 years ago
- Same code , different CPU case , different build case , Iot bins reverse learning.☆29Updated 8 years ago
- Shellcode Spider of Exploit-DB☆11Updated 8 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆42Updated 10 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- plugin of ida with pin☆48Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- 简单的Linux远程控制☆20Updated 8 years ago