theevilbit / vaccination
☆10Updated 7 years ago
Alternatives and similar repositories for vaccination:
Users that are interested in vaccination are comparing it to the libraries listed below
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Post-explotation Hacks☆14Updated 6 years ago
- Windows login backdoor diagnostic tool☆11Updated 7 years ago
- Fuzzing Framework☆10Updated 7 years ago
- ☆22Updated 7 years ago
- ☆10Updated 6 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- ☆18Updated 7 years ago
- ☆12Updated 7 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- Script created to get all the Hancitor C&C address [OLD]☆8Updated 5 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Yet Another Repetitive Rootkit☆9Updated 11 years ago
- Common Malware Techniques☆13Updated last year
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 8 years ago
- ☆16Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Set of useful scrpts☆10Updated 10 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Updated 8 years ago
- A new technique to bypass microsoft's applocker.☆12Updated 9 years ago
- Shellcode injection using debugging APIs☆19Updated 11 years ago
- ☆10Updated 10 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago