Cryptographic Dataset Generation & Modelling Framework
☆41Apr 8, 2020Updated 5 years ago
Alternatives and similar repositories for CryptoKnight
Users that are interested in CryptoKnight are comparing it to the libraries listed below
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 4 years ago
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆86Sep 22, 2018Updated 7 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Sep 16, 2021Updated 4 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Man-in-the-middle against Tor bridges☆28Feb 9, 2020Updated 6 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Towards Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools☆14Feb 19, 2019Updated 7 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Pure Python parser for classic Windows Event Log files (.evt)☆52Jun 30, 2023Updated 2 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Codespaces template for teaching .NET☆14Feb 28, 2024Updated 2 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- Drltrace is a library calls tracer for Windows and Linux applications.☆416Aug 16, 2020Updated 5 years ago
- The SAF Training Lab is a GitHub Codespaces environment that makes it quick and easy for you to use, learn and participate in the MITRE S…☆15Feb 25, 2025Updated last year
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Mar 12, 2021Updated 4 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- badsite.io is intended for manual testing of web security in clients and test tolos☆18May 18, 2018Updated 7 years ago
- Utility to scrape pastebin's incoming feed for known malware techniques☆20Feb 4, 2020Updated 6 years ago
- Distributed Honeypot☆63Apr 29, 2018Updated 7 years ago
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- carcass is a Python package to generate python package scaffolding based on best practices☆17Jan 10, 2022Updated 4 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Java bytecode virus proof of concept (jarfile self-replication)☆17Jun 9, 2023Updated 2 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Apr 23, 2020Updated 5 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago