A repo containing some tooling build to assist with reverse engineering malware samples
☆15Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for MalwareRETools
Users that are interested in MalwareRETools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- ☆19Mar 4, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago
- merge android and recovery ramdisk into single boot.img file. and put Linux boot.img into recovery to dualboot android without reflashing…☆19Aug 8, 2024Updated last year
- ☆12Aug 10, 2022Updated 3 years ago
- ☆12Jul 8, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- ☆12May 31, 2022Updated 3 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆66Jul 1, 2024Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- Enumerate domain machine accounts and perform pre2k password spraying.☆69Jul 14, 2023Updated 2 years ago
- ☆19May 30, 2022Updated 3 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 weeks ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆41May 31, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- ☆152Jun 8, 2025Updated 9 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- OpenSSH Pre-Auth Double Free CVE-2023-25136 POC☆47Apr 21, 2023Updated 2 years ago
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆49Jul 28, 2025Updated 7 months ago