AbertayMachineLearningGroup / CryptoKnight
Cryptographic Dataset Generation & Modelling Framework
☆38Updated 4 years ago
Alternatives and similar repositories for CryptoKnight:
Users that are interested in CryptoKnight are comparing it to the libraries listed below
- ☆36Updated 5 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- ☆32Updated 9 months ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Experiments on C/C++ Exploits☆22Updated 4 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆17Updated 4 years ago
- ☆12Updated 8 years ago
- ☆47Updated 5 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- bunch of random stuff☆21Updated 4 years ago
- Plugins for the Viper Framework☆14Updated 5 years ago
- Yara filetype plugin for Vim.☆14Updated 4 years ago
- ☆18Updated 6 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- Regular expression Search on the command-line☆15Updated 11 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆48Updated last month
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆55Updated last year
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago