AbertayMachineLearningGroup / CryptoKnight
Cryptographic Dataset Generation & Modelling Framework
☆38Updated 5 years ago
Alternatives and similar repositories for CryptoKnight:
Users that are interested in CryptoKnight are comparing it to the libraries listed below
- ☆36Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- ☆18Updated 4 years ago
- ☆32Updated 10 months ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆48Updated 2 months ago
- Format string exploit generation☆10Updated 9 years ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
- A gentle introduction to binary exploitation☆42Updated 4 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- ☆12Updated 8 years ago
- Flare-On solutions☆36Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- ☆13Updated 5 years ago
- A plugin that adds a popup window to Binary Ninja that explains in simple English what an assembly instruction does☆51Updated 4 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- ☆47Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Regular expression Search on the command-line☆16Updated 3 weeks ago