wildcardcorp / samson
Cryptanalysis and attack library
☆22Updated 2 years ago
Related projects: ⓘ
- Open YARA scan- and search engine☆15Updated last year
- Standardizing Security Titles☆13Updated last year
- Advisories and Proofs of Concept by BlackArrow☆17Updated 5 months ago
- Collection of my slide decks & conference videos☆27Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 2 years ago
- ☆10Updated this week
- Windows SSPI wrapper in prue python☆15Updated 9 months ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆10Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- ZAP plugin demonstrating custom view for WebSocket messages.☆13Updated 2 years ago
- A Burp extension to enable modification of FIX messages when relayed from MitM_Relay☆11Updated last year
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 2 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 6 years ago
- Data EXfiltration TestER☆20Updated 5 years ago
- Public exploits☆15Updated 6 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated last week
- Malware campaigns and APTs research by BlackArrow☆17Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- Files related to my training classes☆15Updated 3 years ago
- ☆13Updated 4 years ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago