trustedsec / VerifyELF
☆25Updated 10 months ago
Alternatives and similar repositories for VerifyELF:
Users that are interested in VerifyELF are comparing it to the libraries listed below
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Proof-of-Concept to evade auditd by tampering via ptrace☆17Updated last year
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- ☆18Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 11 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 5 months ago
- A simple Toolkit to BF and decrypt Windows EntraId CacheData☆16Updated 9 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆12Updated 2 years ago
- Decrypt encrypted SonicOSX firmware images☆13Updated last month
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆42Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Tools for offensive security of NetBackup infrastructures☆39Updated last year
- Extension functionality for the NightHawk operator client☆27Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆22Updated 4 years ago
- Linux CS bypass technique☆30Updated 2 months ago
- ☆15Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- self-hosted Azure OSINT tool☆29Updated 6 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago