Pinned Repositories
binaryalert
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
drakvuf
DRAKVUF Black-box Binary Analysis
LOLBAS
Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)
SpeechRecognition
Generating subtitles for a video in realtime using SFSpeechRecognizer
spoofing-office-macro
:fish: PoC of a VBA macro spawning a process with a spoofed parent and command line.
sswares's Repositories
sswares/aa-tools
Artifact analysis tools by JPCERT/CC Analysis Center
sswares/broxy
An HTTP/HTTPS intercept proxy written in Go.
sswares/crawlab
Distributed web crawler admin platform for spiders management regardless of languages and frameworks.
sswares/DECAF
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the DroidScope dynamic Android malware analysis platform. DroidScope is now an extension to DECAF.
sswares/ethereum-lists
A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
sswares/fastapi
FastAPI framework, high performance, easy to learn, fast to code, ready for production
sswares/fiber
🚀 Fiber is an Express inspired web framework written in Go with 💖
sswares/files
sswares/flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
sswares/gopsutil
psutil for golang
sswares/gosseract
Go package for OCR (Optical Character Recognition), by using Tesseract C++ library
sswares/h4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
sswares/libvmi
The official home of the LibVMI project is at https://github.com/libvmi/libvmi.
sswares/macro_pack
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
sswares/Malware-Analysis-Training
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
sswares/Manalyze
A static analyzer for PE executables.
sswares/objection
📱 objection - runtime mobile exploration
sswares/oletools
oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
sswares/OSSEM
Open Source Security Events Metadata (OSSEM)
sswares/owasp-threat-dragon-desktop
An installable desktop variant of OWASP Threat Dragon
sswares/panda
Platform for Architecture-Neutral Dynamic Analysis
sswares/pe-sieve
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
sswares/s2e
This is the main S2E repository. Visit https://s2e.systems/docs to get started.
sswares/subfinder
Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
sswares/SUDO_KILLER
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo
sswares/Triton
Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a dynamic taint engine, AST representations of the x86, x86-64 and AArch64 Instructions Set Architecture (ISA), SMT simplification passes, an SMT solver interface and, the last but not least, Python bindings.
sswares/urh
Universal Radio Hacker: investigate wireless protocols like a boss 📡😎
sswares/vba_obfuscator
VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing in my work.
sswares/Windows-Kernel-Explorer
A free but powerful Windows kernel research tool.
sswares/Yara-Rules
Repository of YARA rules made by McAfee ATR Team