AbertayMachineLearningGroup / CryptoKnightLinks
Cryptographic Dataset Generation & Modelling Framework
☆41Updated 5 years ago
Alternatives and similar repositories for CryptoKnight
Users that are interested in CryptoKnight are comparing it to the libraries listed below
Sorting:
- pure Python binary analysis framework☆23Updated 7 years ago
- ☆36Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 7 years ago
- Emu-strings project - JScript/VBScript automated dropper analysis system☆18Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Updated 6 years ago
- ☆32Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 4 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Web based code browser using clang to provide basic code analysis.☆46Updated 8 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Firmware analysis website + API☆43Updated 5 years ago
- ☆27Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- ☆13Updated 9 years ago
- ☆23Updated 7 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago