Stars
Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-…
firepwd.py, an open source tool to decrypt Mozilla protected passwords
PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.
NetRipper - Smart traffic sniffing for penetration testers
Everything about Web Application Firewalls (WAFs) from Security Standpoint! 🔥
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Simple tool to extract data from Usb-hid-parser
DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.
Free hands-on digital forensics labs for students and faculty
A simple QnA-style challenge checker for Forensics category
A list of attacks or malware using steganography or information hiding
My musings with PowerShell
Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect and divert the forensic analysis techniques. The plugin dete…
The Elastic stack (ELK) powered by Docker and Compose.
Bootstrap yourself to write an OS from scratch. A book for self-learner.
MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Official writeups for Business CTF 2024: The Vault Of Hope
Initial version of personal cheatsheet for windows registry forensics
An List of my Powershell scripts, commands and Blogs for windows Red Teaming.
Compare efficiency of steganographic processes LSB,DCT and DWT
A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficients. This application was developed for a graduate-level unive…
Devkit for quickly building CLI tools with Python
Presentation material presented by Outflank team members at public events.
Writing custom backdoor payloads with C# - Defcon 27 Workshop
PowerShell scripts for better debugging and life