Thanks to visit codestin.com
Credit goes to github.com

Skip to content
View mikecjudge's full-sized avatar

Block or report mikecjudge

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Resolves DLL API entrypoints for a process w/ remote query capabilities.

Visual Basic 57 25 Updated Jun 23, 2017

QEMU with rVMI extensions

C 25 19 Updated Jul 25, 2017

pure Python binary analysis framework

Python 23 16 Updated Oct 26, 2018

The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.

13 16 Updated Sep 9, 2020

Help deobfuscate VBScript

VBA 17 5 Updated Jul 1, 2022
C# 263 71 Updated Apr 10, 2023

Windows kernel and user mode emulation.

Python 1,806 270 Updated Dec 2, 2025

A machine learning tool that ranks strings based on their relevance for malware analysis.

Python 747 126 Updated May 19, 2025
Python 398 97 Updated Dec 5, 2025

GoCrack is a management frontend for password cracking tools written in Go

Go 1,260 242 Updated Nov 19, 2025

Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…

PowerShell 1,299 258 Updated Jun 1, 2023
Python 19 6 Updated Jul 6, 2024

Azure Deployment Templates for Mandiant Managed Huning

12 14 Updated Jun 1, 2023

Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]

PowerShell 7,443 1,337 Updated Oct 16, 2025

Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

Python 12,025 953 Updated Dec 19, 2025

The goal of this repository is to document the most common techniques to bypass AppLocker.

PowerShell 2,034 365 Updated Sep 11, 2023

Mitrastar MIPS router analysis and exploitation

C 19 3 Updated Jul 25, 2021

collection of pentesting and network security documents

19 4 Updated Jun 1, 2022

Collection of Python scripts for reading information about and extracting data from UBI and UBIFS images.

Python 6 1 Updated Jun 29, 2023

a set of scripts and tools for various firmware analysis tasks

Python 77 23 Updated Apr 4, 2025

Demo RPI App for NTP MitM attack

PHP 7 1 Updated Oct 28, 2024

Bash script to automate setup of Linux router useful for IoT device traffic analysis and SSL mitm

Shell 548 88 Updated Sep 11, 2025

system setup and scripts for various mitm activities

Shell 109 15 Updated Aug 4, 2022

Microsoft Defender for Endpoint Device Control tools, samples, and resources.

Python 69 59 Updated Mar 20, 2025

Scots Army Knife for electronics

Python 1 Updated Sep 28, 2024

A streamlined tool for discovering private TLDs for security research.

Go 232 8 Updated Dec 22, 2025

VStarcam P2P Decryption Utility

Python 48 6 Updated Aug 15, 2024

Given an Arduino compatible microcontroller or Raspberry PI (experimental), JTAGenum scans pins[] for basic JTAG functionality and can be used to enumerate the Instruction Register for undocumented…

C++ 780 113 Updated Oct 30, 2023

JTAGulator alternative & a hardware hacker's multi-tool for RP2040 microcontroller based development boards including RPi Pico & RP2040-Zero

C 392 34 Updated Jul 12, 2025
Next