AbertayMachineLearningGroup / CryptoKnightLinks
Cryptographic Dataset Generation & Modelling Framework
☆38Updated 5 years ago
Alternatives and similar repositories for CryptoKnight
Users that are interested in CryptoKnight are comparing it to the libraries listed below
Sorting:
- pure Python binary analysis framework☆23Updated 6 years ago
- ☆36Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆110Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- API functions for Malware Research☆35Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Binary reversing tool to find all possible code paths between two functions.☆27Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- ☆13Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- ☆23Updated 7 years ago
- Decoders for 7ev3n ransomware☆16Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- hax 'n shit☆120Updated 10 years ago
- Binary, Analysis, and Disassembler Radare2 Plugins for Dan32 architechture binaries☆17Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago