AGDCservices / Ghidra-ConfigurationsLinks
☆16Updated 4 years ago
Alternatives and similar repositories for Ghidra-Configurations
Users that are interested in Ghidra-Configurations are comparing it to the libraries listed below
Sorting:
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- ☆27Updated 3 years ago
- My malware analysis code snippets☆28Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- ☆37Updated 4 years ago
- ☆37Updated 10 months ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- ☆29Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago
- Open YARA scan- and search engine☆25Updated 11 months ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- ☆17Updated 4 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Updated 2 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 4 months ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆22Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- ☆22Updated 5 years ago
- Help deobfuscate VBScript☆18Updated 3 years ago