AshleyT3 / tutorial-sample-codeLinks
☆10Updated 3 months ago
Alternatives and similar repositories for tutorial-sample-code
Users that are interested in tutorial-sample-code are comparing it to the libraries listed below
Sorting:
- Various Tutorials☆208Updated last month
- Python tool to analyze PE file for patterns used by malware☆26Updated 2 years ago
- User-friendly Microsoft Windows Debugger for Malware Analysts.☆202Updated 2 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated 9 months ago
- This repository contains code, manuals and notes I wrote pertaining to system programming on Linux☆11Updated 2 years ago
- Microsoft Windows DLL Export Browser (Enumerate Exports, COM Methods and Properties) with Advanced Search Features.☆238Updated last year
- Some of CrackMes made by me :)☆18Updated 3 years ago
- An unpacker for Clickteam Install Creator installers☆37Updated last year
- Various graphical effects in assembly language from the warez scene.☆107Updated 5 months ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆68Updated 4 years ago
- License Manager, a part of Windows Server Management Tools☆16Updated last month
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆140Updated 3 months ago
- CyoHash is a simple shell extension that is used from within Windows Explorer to calculate the MD5 hash, SHA-1 hash, SHA-2 hash (SHA-256,…☆23Updated 5 years ago
- This program allows to edit the relocation table into a Portable Executable file☆52Updated 5 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Updated 3 years ago
- Extract the original ransomware binary from an NSIS installer☆17Updated 8 years ago
- ☆105Updated last year
- https://0xrick.github.io/win-internals/pe8/☆49Updated 3 years ago
- ThunderCls's x64dbg Acid Lime Theme remixed☆11Updated 3 years ago
- File integrity monitor with malware detection using machine learning☆13Updated last year
- API Logger for Windows Executables☆79Updated 5 years ago
- Library and tools to access the executable (EXE) format☆44Updated last year
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆48Updated 10 months ago
- 64-bit version of IDR (not complete, use as is)☆46Updated 6 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆27Updated 3 years ago
- World's First Haiku Ransomware/Malware☆14Updated 9 months ago
- GUI framework in Assembly Language for Keygens/Patchers (Windows)☆27Updated 4 years ago
- A snake game written in x86 Assembly language for windows console☆32Updated 6 years ago
- Malware Analysis Exercise Samples and Resources☆50Updated last month