Yet Another Memory Analyzer for malware detection
☆24Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for YAMA-dev
Users that are interested in YAMA-dev are comparing it to the libraries listed below
Sorting:
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- my goto docker image when playing ctfs with all the tools I need☆21Mar 8, 2026Updated 2 weeks ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- ☆63Apr 10, 2023Updated 2 years ago
- A small dependency-free library for interfacing with a Ledger over the Web Authentication API.☆10Jan 9, 2023Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- ☆19May 30, 2022Updated 3 years ago
- ☆10May 22, 2023Updated 2 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆54Oct 16, 2023Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- ☆91Jul 18, 2023Updated 2 years ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Oct 26, 2023Updated 2 years ago
- Repository around beethoven X token & governance☆14Dec 14, 2024Updated last year
- Everything related to YARA☆16Feb 19, 2026Updated last month
- A repo for UVa's CS 4630, Defense Against the Dark Arts course☆18Dec 5, 2017Updated 8 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Attempt to help against the ongoing Tor DDoS attacks☆13Dec 31, 2022Updated 3 years ago
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- CVE-2023-20198 PoC (!)☆11Oct 17, 2023Updated 2 years ago
- ☆19Sep 18, 2023Updated 2 years ago
- wsnet☆26Mar 4, 2026Updated 2 weeks ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- ☆18Dec 9, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- ☆21Updated this week
- DLL Exports Extraction BOF with optional NTFS transactions.☆90Nov 5, 2021Updated 4 years ago