AbertayMachineLearningGroup / CryptoKnightLinks
Cryptographic Dataset Generation & Modelling Framework
☆40Updated 5 years ago
Alternatives and similar repositories for CryptoKnight
Users that are interested in CryptoKnight are comparing it to the libraries listed below
Sorting:
- pure Python binary analysis framework☆23Updated 7 years ago
- ☆36Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Web based code browser using clang to provide basic code analysis.☆45Updated 8 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Updated 7 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 4 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- Source codes for "The Antivirus Hackers Handbook" book.☆61Updated 10 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- Copy of the contents at phrack.com☆41Updated 8 months ago
- Here comes the paintrain!☆11Updated 9 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆57Updated 8 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- ☆15Updated 4 years ago