A :zap: lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis …
Portable Executable reversing tool with a friendly GUI
A simple crossplatform heuristic PE-analyzer
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory…
Tool to analyze PE files in python 3. Current features : Show information about the file (import, exports, resources) Search for interesting…
Python implementation of the Packed Executable iDentifier (PEiD)
Portable Executable (PE) library written in .Net
Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows ma…
Visualize networks of phishing by querying the phishstats.info API
picoCTF 2024 Writeup (Capture the Flag Competition) with the solutions for the challenges.
This is a python package for detecting copy-move attack on a digital image.
Network traffic analysis tool for Attack & Defense CTF's
Plaso (Plaso Langar Að Safna Öllu), or super timeline all the things, is a Python-based engine used by several tools for automatic creation …
Timeline creation and analysis tool. Extracts timestamps from hundreds of artifact types across Windows, Linux, and macOS to create a super-…
PagerDuty's Public Postmortem Documentation
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environm…
Process-aware, eBPF-based tcpdump
Practical Windows Forensics Training
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.
Python library for reading and writing Windows shortcut files (.lnk). Python 3 only.
A python library to parse OneNote (.one) files
Python-based Comprehensive Network Packet Analysis Library
We took PersistenceSniper, merged it with Python, and misspelled it on purpose. Meet PyrsistenceSniper.