AGDCservices / Ghidra-Configurations
☆16Updated 3 years ago
Alternatives and similar repositories for Ghidra-Configurations:
Users that are interested in Ghidra-Configurations are comparing it to the libraries listed below
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- ☆37Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- ☆27Updated 3 years ago
- ☆18Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- Data EXfiltration TestER☆21Updated 5 years ago
- Tools that trigger False Positive AV alerts☆48Updated 3 months ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆29Updated 5 years ago
- Python wrappers for mal_unpack☆36Updated last year
- ☆27Updated 4 months ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- ☆22Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆13Updated 3 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆54Updated 2 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago