Nacho (ignacioj)

ignacioj

Geek Repo

Location:Spain

Twitter:@nachpj

Github PK Tool:Github PK Tool

Nacho's repositories

mftf

$MFT parser (from live systems or a copy of the $MFT) and raw file copy utility

Language:C#Stargazers:36Issues:0Issues:0

WhacAMole

Live memory analysis detecting malware IOCs in processes, modules, handles, tokens, threads, .NET assemblies, memory address space and environment variables. Dumps, detects and dissasemble hooks, shellcode, memory regions, modules and processes.

Language:C++License:NOASSERTIONStargazers:27Issues:4Issues:1

regkeval

Malware detection in registry using a baseline

Language:PerlStargazers:2Issues:1Issues:0

RATDecoders

Python Decoders for Common Remote Access Trojans

Language:PythonLicense:MITStargazers:1Issues:0Issues:0

TangledWinExec

C# PoCs for investigation of Windows process execution techniques

Language:C#License:BSD-3-ClauseStargazers:1Issues:0Issues:0

WMIParserStr

WMI OBJECTS.DATA parser

Language:C#License:MITStargazers:1Issues:0Issues:0
Language:C++Stargazers:0Issues:0Issues:0

APT_CyberCriminal_Campagin_Collections

APT & CyberCriminal Campaign Collection

Language:YARAStargazers:0Issues:0Issues:0

DLLHiding

Hiding x32/x64 Modules/DLLs using PEB

Language:C++Stargazers:0Issues:0Issues:0

EvasiveProcessHollowing

Evasive Process Hollowing Techniques

Language:CStargazers:0Issues:0Issues:0

RC4_Encrypt-Decrypt

RC4 encryption and decryption tool (c#)

Language:C#Stargazers:0Issues:0Issues:0
Stargazers:0Issues:1Issues:0
Language:C++Stargazers:0Issues:0Issues:0

mellivora

Mellivora is a CTF engine written in PHP

Language:PHPLicense:GPL-3.0Stargazers:0Issues:2Issues:0

Registry_Service_triggers

Extract service triggers from SYSTEM registry.

Language:PerlStargazers:0Issues:0Issues:0

RegRipper2.8

RegRipper version 2.8

Language:PerlLicense:NOASSERTIONStargazers:0Issues:0Issues:0

systeminformer

A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. @ http://www.windows-internals.com

License:MITStargazers:0Issues:0Issues:0

TamperETW

PoC to demonstrate how CLR ETW events can be tampered.

Language:CStargazers:0Issues:0Issues:0

TekDefense-Automater

Automater - IP URL and MD5 OSINT Analysis

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

wmi-parser

Parses the WMI object database....looking for persistence

Language:C#Stargazers:0Issues:1Issues:0