A repo containing some tooling build to assist with reverse engineering malware samples
☆15Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for MalwareRETools
Users that are interested in MalwareRETools are comparing it to the libraries listed below
Sorting:
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Exploits for some linux binaries :)☆36Nov 2, 2025Updated 4 months ago
- offensive security scripts and documentation☆30Dec 9, 2025Updated 2 months ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- Firebase database finder.☆13Dec 30, 2020Updated 5 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- ☆19May 30, 2022Updated 3 years ago
- ☆14Mar 20, 2025Updated 11 months ago
- merge android and recovery ramdisk into single boot.img file. and put Linux boot.img into recovery to dualboot android without reflashing…☆19Aug 8, 2024Updated last year
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 2 years ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- ☆12May 31, 2022Updated 3 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago