zooba / spythonLinks
Example implementations of PEP 578 and 551 entry points
☆35Updated 8 months ago
Alternatives and similar repositories for spython
Users that are interested in spython are comparing it to the libraries listed below
Sorting:
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- ☆49Updated 6 years ago
- This project is a lightweight wrapper for interacting with WMI using python/ctypes☆38Updated 6 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- Liberating dem proprietary APT implants☆20Updated 6 years ago
- My python3 implementation of a Forward Shell☆36Updated 7 years ago
- Parsing MITRE EDR Evaluation results☆12Updated 7 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- ☆60Updated 5 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- A Web Server to hide stuff☆21Updated 3 years ago
- ☆13Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Updated 6 years ago
- ☆20Updated 6 years ago
- ☆64Updated last year
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- ☆110Updated 7 years ago
- Different code-injections techniques under a common tool☆30Updated 5 years ago
- Certificate Export Utility☆26Updated 5 years ago
- SSH spreading made easy for red teams in a hurry☆57Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- ☆28Updated 8 years ago