Pinned Repositories
ADACLScanner
Repo for ADACLScan.ps1 - Your number one script for ACL's in Active Directory
ADAPE-Script
Active Directory Assessment and Privilege Escalation Script
Aggressor-Scripts
Aggregation of Cobalt Strike's aggressor scripts.
AggressorScripts
Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources
buffer-overflow
Windows Buffer Overflow Cheat Sheet
IDAYara
IDA Pro Yara Scan
limesdr-uhd-install
LimeSDR with UHD in Ubuntu 14.04
Rookit-Arsenal-2009
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
windows-triage
A simple Windows triage for incident response
SiowCY's Repositories
SiowCY/editor
The official Code in the Dark editor
SiowCY/pafish
Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.
SiowCY/b374k
PHP Webshell with handy features
SiowCY/rex
Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.
SiowCY/patchkit
powerful binary patching from Python
SiowCY/metame
metame is a metamorphic code engine for arbitrary executables
SiowCY/vmmfuzzer
A hypervisor or virtual machine monitor (VMM) fuzzer.
SiowCY/binch
A light ELF binary patch tool in python urwid
SiowCY/boofuzz
A fork and successor of the Sulley Fuzzing Framework
SiowCY/choronzon
An evolutionary knowledge-based fuzzer
SiowCY/winafl
A fork of AFL for fuzzing Windows binaries
SiowCY/bintut
Teach you a binary exploitation for great good.
SiowCY/anti-analysis-tricks
Bunch of techniques potentially used by malware to detect analysis environments
SiowCY/CyberCrowl
CyberCrowl is a python Web path scanner tool
SiowCY/DVRF
The Damn Vulnerable Router Firmware Project
SiowCY/Rookit-Arsenal-2009
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
SiowCY/PHP-backdoors
A collection of PHP backdoors. For educational or testing purposes only.
SiowCY/CVE-2015-6086
PoC for CVE-2015-6086
SiowCY/roper
Evolve ROP-chain attacks on a target binary, using genetic algorithms. Code base mostly in Common Lisp and C.
SiowCY/exploit-database
The official Exploit Database repository
SiowCY/exploit-database-bin-sploits
Exploit Database binary exploits located in the /sploits directory
SiowCY/lisa.py
-An Exploit Dev Swiss Army Knife.
SiowCY/windows-triage
A simple Windows triage for incident response
SiowCY/icmpsh
Simple reverse ICMP shell
SiowCY/the-backdoor-factory
Patch PE, ELF, Mach-O binaries with shellcode
SiowCY/EhTrace
ATrace is a tool for tracing execution of binaries on Windows.
SiowCY/binnavi
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
SiowCY/pics
Posters & pictures
SiowCY/volatility
An advanced memory forensics framework
SiowCY/awesome-malware-analysis
A curated list of awesome malware analysis tools and resources