AbertayMachineLearningGroup / CryptoKnight
Cryptographic Dataset Generation & Modelling Framework
☆39Updated 4 years ago
Alternatives and similar repositories for CryptoKnight:
Users that are interested in CryptoKnight are comparing it to the libraries listed below
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- ☆36Updated 5 years ago
- ☆47Updated 5 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 11 years ago
- Flare-On solutions☆36Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- ☆32Updated 7 months ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Regular expression Search on the command-line☆15Updated 9 months ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- ☆12Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- ☆26Updated last year
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆28Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆36Updated 5 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆46Updated last week
- ☆17Updated 3 years ago
- API functions for Malware Research☆35Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- A VBScript for detecting VirtualBox☆20Updated 9 years ago
- ☆18Updated 5 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago