AbertayMachineLearningGroup / CryptoKnightLinks
Cryptographic Dataset Generation & Modelling Framework
☆38Updated 5 years ago
Alternatives and similar repositories for CryptoKnight
Users that are interested in CryptoKnight are comparing it to the libraries listed below
Sorting:
- pure Python binary analysis framework☆23Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆36Updated 5 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ☆32Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- ☆27Updated 2 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Updated 8 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- ☆35Updated 7 years ago
- API functions for Malware Research☆35Updated 6 years ago
- ☆47Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Copy of the contents at phrack.com☆40Updated 6 months ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Updated 6 years ago
- Flare-On solutions☆37Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago