Advanced dynamic malware analysis tool.
☆84Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for BehavEye
Users that are interested in BehavEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 7 months ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Browser Protector against various stealers, written in C# & C/C++.☆222Feb 20, 2025Updated last year
- Good python obfuscator☆11Aug 20, 2022Updated 3 years ago
- Copy Protection Software and Obfuscator which make you securly implement a license for a user, supports licensing with: HWID, License, US…☆134May 21, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A nice tool to get all discord token info☆14Apr 18, 2023Updated 3 years ago
- Kernel Cache Decryption for iOS☆17Nov 16, 2021Updated 4 years ago
- Auth system with encryption and web dashboard in python☆19May 7, 2024Updated last year
- reverse engineering random malwares☆23Mar 12, 2026Updated last month
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 9 months ago
- .NET Project containing plenty of advanced techniques to detect various types of malicious actions on your software, with syscall support…☆347Jul 19, 2025Updated 9 months ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- Patching HTTP Toolkit Pro to crack it and use paid features for free☆35Nov 14, 2024Updated last year
- AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit…☆21Dec 22, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- ☆18Mar 28, 2023Updated 3 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆74Dec 10, 2021Updated 4 years ago
- Hurricane - The best .NET Patcher & Analyzer. Made by Cabbo.☆38Apr 7, 2023Updated 3 years ago
- The ultimate AI-powered toolkit for python reverse engineering☆981Apr 15, 2026Updated 2 weeks ago
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- ☆30Oct 19, 2024Updated last year
- ☆37Nov 8, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆139Aug 31, 2025Updated 7 months ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆23Nov 3, 2024Updated last year
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Just keyauth server emulator made in python☆37Feb 12, 2024Updated 2 years ago
- Decompiler and deobfuscator that offers support to track discord webhooks inside: blank stealer, luna grabber, thiefcat, Creal and all un…☆113Nov 11, 2024Updated last year
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆11Jun 3, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- Repository hosting windows defender DOS tool☆341Apr 12, 2026Updated 2 weeks ago
- Best Repo for learn DDOS ( Send me Stars ⭐ )☆38Feb 5, 2026Updated 2 months ago
- Spoof the return address of any function call.☆11Jul 21, 2024Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- ☆20Jul 23, 2023Updated 2 years ago
- Deobfuscation of XorStringsNet☆13Nov 5, 2024Updated last year