Command line tool for testing CRLF injection on a list of domains.
A multithreaded many-rules to many-files YARA scanner for incident response or malware zoos. Prerequisites: YARA installed and Python 3.0-3.5 with the Yara-Python package. Yara-Python requires Microsoft Visual C++ Build Tools available under 'Build Tools for Visual Studio 2017' and the Yara binaries. Alternatively, you can download an easy installer which should download everything you need for your version of Python (only supports up to Python 3.5). To run with default settings, just specify a folder for .yar rules and a starting point for files to scan. All directories for both inputs are scanned recursively.
Command line tool for testing CRLF injection on a list of domains.
Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
A curated list of open-source projects containing protestware sourced from various platforms.
A Linux process injection tool that injects shellcode into a running process
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.