☆28Feb 13, 2017Updated 9 years ago
Alternatives and similar repositories for nymaim-tools
Users that are interested in nymaim-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- collection of used Tools for CTFs☆15Oct 24, 2021Updated 4 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Mar 17, 2021Updated 5 years ago
- Basic x86 Symbolic Execution for educational purposes☆18May 8, 2017Updated 8 years ago
- An super lightweight utility for creating bootable USB drives.☆23Mar 8, 2026Updated 2 weeks ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Some malware samples or suspicious files I found and their reports.☆38Nov 28, 2021Updated 4 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- A compilation of snort rules for detecting malware traffic.☆16Feb 7, 2021Updated 5 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- A sinkhole for collecting and analysing malicious traffic☆17Sep 12, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Analyzing Rig Exploit Kit☆49May 17, 2017Updated 8 years ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated 2 weeks ago
- ☆14Jan 12, 2018Updated 8 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- CMU's attack lab☆13Sep 7, 2023Updated 2 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A simple arp spoof script written with python☆14Mar 18, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Arancino is a dynamic protection framework that defends Intel Pin against anti-instrumentation attacks.☆73Apr 28, 2022Updated 3 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆84Jun 1, 2022Updated 3 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- ☆30Mar 31, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- to be deleted - check github.com/corkami☆13Sep 16, 2014Updated 11 years ago
- ☆117Aug 9, 2016Updated 9 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- mruby running inside the bare-metal hypervisor☆19Mar 8, 2020Updated 6 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 7 months ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆142Sep 29, 2022Updated 3 years ago