☆13Aug 19, 2015Updated 10 years ago
Alternatives and similar repositories for volatility-attributeht
Users that are interested in volatility-attributeht are comparing it to the libraries listed below
Sorting:
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- Service to automatically upload built Fedora images to internal and external cloud providers.☆22Apr 17, 2023Updated 2 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Free_the_Debuggers☆19Feb 7, 2015Updated 11 years ago
- Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project☆56Feb 2, 2012Updated 14 years ago
- Available-for-hire badge☆17Oct 31, 2016Updated 9 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- 视频直播项目☆11Dec 30, 2025Updated 2 months ago
- A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefil…☆18Mar 23, 2014Updated 11 years ago
- Tools for IDA☆13May 25, 2016Updated 9 years ago
- Simple Android voice recognition app☆12Nov 21, 2012Updated 13 years ago
- aptoide app store APK download☆27Jul 31, 2015Updated 10 years ago
- Julia package for finding the longest simple path in a graph.☆14Dec 23, 2023Updated 2 years ago
- 《自己动手设计数据库》摘录☆10Oct 28, 2016Updated 9 years ago
- ☆15Sep 27, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Lurker monitors an incoming network TCP SYN packet to invalid port number, and will respond a TCP SYN-ACK packet to collect packet payloa…☆12Feb 10, 2018Updated 8 years ago
- A PE Header-Based Antivirus Tool☆12Nov 14, 2014Updated 11 years ago
- This project presents a fast and efficient technique for recognition of continuous hand gestures with a stationary background from video …☆11Mar 12, 2015Updated 11 years ago
- Suite of classes for Windows programming☆18Apr 13, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Demo code to call librtlsdr from Android☆28Jul 26, 2012Updated 13 years ago
- ☆24Mar 8, 2017Updated 9 years ago
- Libiqxmlrpc is an implementation of the XML-RPC standard in C++.☆14Nov 3, 2022Updated 3 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Aug 23, 2014Updated 11 years ago
- Source code for the beta release of CobraDroid☆14Mar 8, 2020Updated 6 years ago
- Dirty Cow implement in Go☆11Nov 3, 2016Updated 9 years ago
- sync NIST's National Vulnerability Database into a local sqlite3 database☆14Apr 27, 2013Updated 12 years ago