Cryptographic Dataset Generation & Modelling Framework
☆41Apr 8, 2020Updated 6 years ago
Alternatives and similar repositories for CryptoKnight
Users that are interested in CryptoKnight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- I'll post some malware analysis from time to time.☆24Apr 3, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆88Sep 22, 2018Updated 7 years ago
- Man-in-the-middle against Tor bridges☆28Feb 9, 2020Updated 6 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Web based code browser using clang to provide basic code analysis.☆47Jul 20, 2017Updated 8 years ago
- ☆35May 26, 2020Updated 5 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 8 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Sep 16, 2021Updated 4 years ago
- Collaborative malware analysis framework☆383Jan 22, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Pure Python parser for classic Windows Event Log files (.evt)☆52Jun 30, 2023Updated 2 years ago
- The Binary Mutation code based on Uroboros☆14Feb 20, 2019Updated 7 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11May 14, 2026Updated last week
- Easy sandboxing for rust☆12Jun 19, 2016Updated 9 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- carcass is a Python package to generate python package scaffolding based on best practices☆17Jan 10, 2022Updated 4 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Target-centric program analysis.☆76Mar 16, 2026Updated 2 months ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Mar 12, 2021Updated 5 years ago
- Distributed Honeypot☆63Apr 29, 2018Updated 8 years ago
- Codespaces template for teaching .NET☆14Feb 28, 2024Updated 2 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- An Integrity-Check Monitoring Pintool☆59Nov 2, 2020Updated 5 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 15 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- A keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy☆16Oct 11, 2017Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Ghidra RE scripts☆38Feb 5, 2021Updated 5 years ago