☆25Mar 19, 2025Updated 11 months ago
Alternatives and similar repositories for skidstorm
Users that are interested in skidstorm are comparing it to the libraries listed below
Sorting:
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆22Apr 11, 2025Updated 10 months ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated 11 months ago
- XrefGen is a professional-grade cross-reference generator that detects indirect references and complex control-flow patterns that IDA Pro…☆29Feb 1, 2026Updated last month
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- NFC MiTM made with two PN532 readers and a Raspberry Pi.☆33Jan 20, 2026Updated last month
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 6 months ago
- ☆10Jun 16, 2021Updated 4 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- Automatic multiprocess Linux CLI tool that aims for a quick enumeration wrapping pentesting tools.☆13Feb 22, 2026Updated last week
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Aug 22, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆34Aug 16, 2023Updated 2 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- We found a way to DLL sideload with cleanmgr.exe☆98Feb 25, 2025Updated last year
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Apr 22, 2019Updated 6 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated 11 months ago
- Mode-line stopwatch in Emacs☆12Aug 27, 2019Updated 6 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆44Dec 19, 2025Updated 2 months ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- Attacking the cleanup_module function of a kernel module☆56Jun 30, 2025Updated 8 months ago