t-tani / YAMA-dev
Yet Another Memory Analyzer for malware detection
☆24Updated last year
Alternatives and similar repositories for YAMA-dev:
Users that are interested in YAMA-dev are comparing it to the libraries listed below
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆41Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- ☆26Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated last year
- ☆51Updated last month
- exfiltration/infiltration toolkit☆23Updated last year
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- ☆16Updated 10 months ago
- ☆34Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- OSED Practice binary☆24Updated last year
- Cobalt Strike BOFS☆16Updated last year
- Docker container for running CobaltStrike 4.10☆36Updated 4 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated 11 months ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆37Updated last year
- ☆18Updated 10 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 8 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 11 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 6 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- Make an Linux Kernel rootkit visible again.☆46Updated 3 weeks ago
- POC for unauthenticated RCE in Aspect Unified Installation Assistant by Aspect Software found in 2021.☆12Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆41Updated 6 months ago
- ☆27Updated last year