CERT-Polska / nymaim-toolsView external linksLinks
☆28Feb 13, 2017Updated 9 years ago
Alternatives and similar repositories for nymaim-tools
Users that are interested in nymaim-tools are comparing it to the libraries listed below
Sorting:
- ☆13Oct 10, 2018Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Analyzing Rig Exploit Kit☆49May 17, 2017Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- An super lightweight utility for creating bootable USB drives.☆22Dec 17, 2020Updated 5 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- ☆12Jan 25, 2020Updated 6 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- A compilation of snort rules for detecting malware traffic.☆15Feb 7, 2021Updated 5 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- ☆15May 1, 2023Updated 2 years ago
- to be deleted - check github.com/corkami☆13Sep 16, 2014Updated 11 years ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆142Sep 29, 2022Updated 3 years ago