Pinned Repositories
2014-03-17-purdue
Bootcamp at Purdue University in March 2014
4n6-scripts
Forensic Scripts
analyzeMFT
awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
sha8e's Repositories
sha8e/botnet-lab
An IRC based tool for testing the capabilities of a botnet.
sha8e/DigitalForensics101
Windows Digital Forensic Analysis Tool
sha8e/dnsftp
Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.
sha8e/Empire
Empire is a pure PowerShell post-exploitation agent.
sha8e/Exploitation
Windows Software Exploitation
sha8e/how2heap
A repository for learning various heap exploitation techniques.
sha8e/Interceptor
PowerShell HTTP(s) Intercepting Proxy
sha8e/lnk-parser
Automatically exported from code.google.com/p/lnk-parser
sha8e/LogFileParser
Parser for $LogFile on NTFS
sha8e/Malware
Course materials for Malware Analysis by RPISEC
sha8e/malwarecookbook
Automatically exported from code.google.com/p/malwarecookbook
sha8e/memorpy
Python library using ctypes to search/edit windows programs memory
sha8e/mona
Corelan Repository for mona.py
sha8e/nflow-generator
NetFlow Generator for Testing Flow Collection Apps
sha8e/OWASP-VWAD
The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available.
sha8e/PoshRat
PowerShell Reverse HTTPs Shell
sha8e/PoshSec
PoshSec PowerShell Module
sha8e/PowerForensics
PowerShell - Live disk forensics platform
sha8e/prettytable
Automatically exported from code.google.com/p/prettytable
sha8e/Python-Reverse-Shell
Python reverse shell.
sha8e/pyv8
Automatically exported from code.google.com/p/pyv8
sha8e/SANS-DFIR-2015
SANS DFIR 2015 write up
sha8e/SystemProgramming
UIUC Crowd-Sourced System Programming Book
sha8e/tbhm
The Bug Hunters Methodology
sha8e/ThinkStats2
Text and supporting code for Think Stats, 2nd Edition
sha8e/thp2
thp2 setup
sha8e/transmorgify
Antiforensics tool for manipulating "magic numbers"
sha8e/usbdeviceforensics
Python script for extracting USB information from Windows registry hives
sha8e/workshops-http
HTTP challenges for the workshop
sha8e/write-ups-2015