☆28Feb 13, 2017Updated 9 years ago
Alternatives and similar repositories for nymaim-tools
Users that are interested in nymaim-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Mar 17, 2021Updated 5 years ago
- An super lightweight utility for creating bootable USB drives.☆23Mar 8, 2026Updated last month
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13Oct 10, 2018Updated 7 years ago
- Some malware samples or suspicious files I found and their reports.☆42Nov 28, 2021Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- A compilation of snort rules for detecting malware traffic.☆16Feb 7, 2021Updated 5 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- Analyzing Rig Exploit Kit☆50May 17, 2017Updated 8 years ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆14Jan 12, 2018Updated 8 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- A simple arp spoof script written with python☆14Mar 18, 2020Updated 6 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 4 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Jun 1, 2022Updated 3 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- ☆30Mar 31, 2017Updated 9 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- to be deleted - check github.com/corkami☆13Sep 16, 2014Updated 11 years ago
- ☆118Aug 9, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 8 months ago
- ☆54Sep 6, 2020Updated 5 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆143Sep 29, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- A study on the automation of unpacking API wrapping in Themida☆13May 3, 2018Updated 8 years ago