AGDCservices / Ghidra-ConfigurationsLinks
☆16Updated 4 years ago
Alternatives and similar repositories for Ghidra-Configurations
Users that are interested in Ghidra-Configurations are comparing it to the libraries listed below
Sorting:
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- My malware analysis code snippets☆29Updated 2 years ago
- Tools that trigger False Positive AV alerts☆51Updated 9 months ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- Autopsy Module to analyze Registry Hives☆15Updated 3 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- ☆24Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- ☆37Updated 4 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 11 months ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 3 weeks ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 4 years ago
- ☆17Updated 3 years ago
- Royal Road RTF Weaponizer object decoder☆24Updated last year
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 weeks ago
- This is the official repository for Basic Malware Analysis Course☆20Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Collection of red machine learning projects☆41Updated 4 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- isodump - ISO dump utility☆41Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 10 months ago