Stars
Python tool to check rootkits in Windows kernel
Powershell script deobfuscation using AST in Python
A C++ tool to unstrip Rust/Go binaries (ELF and PE)
A collection of tools and detections for the Sliver C2 Frameworj
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a…
JADX-gui scripting plugin for dynamic decompiler manipulation
Rapidly Search and Hunt through Windows Forensic Artefacts
Rust Demangler & Normalizer plugin for IDA
Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azur…
A ProcessMonitor visualization application written in rust.
A .NET library to make MSG files without the need for Outlook
Sysdig Inspect - A powerful opensource interface for container troubleshooting and security investigation
ELF file viewer/editor for Windows, Linux and MacOS.
Linux system exploration and troubleshooting tool with first class support for containers
The ansible playbook to improve the security of your SSH
AssemblyLine 4: File triage and malware analysis
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
A tool to find folders excluded from AV real-time scanning using a time oracle
Noriben - Portable, Simple, Malware Analysis Sandbox
io_uring based network scanner written in Rust
Signatures and IoCs from public Volexity blog posts.
Modern UI and powerful API for Ansible, Terraform/OpenTofu/Terragrunt, PowerShell and other DevOps tools.
A repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update. Use these CSVs t…
A centralized and enhanced memory analysis platform
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen…