Dump and parse embedded certificates from Windows binaries
☆11Jan 3, 2012Updated 14 years ago
Alternatives and similar repositories for pe32-cert-dump
Users that are interested in pe32-cert-dump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Live previews of :norm and :global commands for Neovim.☆11Nov 5, 2021Updated 4 years ago
- A program to sign an arbitrary file with your Logbook of the World key and verify such signatures.☆18Dec 29, 2025Updated 2 months ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Nov 13, 2017Updated 8 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- [read-only mirror] More complete Debian environment for Docker, minimal image☆13Aug 9, 2025Updated 7 months ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- Simple, stupid and fast tab-bar for VIM.☆14Jan 13, 2020Updated 6 years ago
- Malware.lu tools☆64Oct 28, 2013Updated 12 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- DSIG digitial signatures for Truetype .TTF and Opentype .OTF fonts☆12Sep 22, 2016Updated 9 years ago
- ed fork with simple C/C++ syntax highlighting on the linux console, using GNU source-highlight☆13Aug 2, 2022Updated 3 years ago
- Perl utilities to retrieve and/or set basic and enhanced telnet passwords (amongst others)☆16Jun 16, 2014Updated 11 years ago
- This is a frontend for the STIX™ (2.0) language.☆17Dec 20, 2018Updated 7 years ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- Sotto: A Silent One-Handed Modular Keyset☆17Oct 15, 2017Updated 8 years ago
- A self-contained nmap package, using the AppImage format, for use in compromised systems☆13Jun 20, 2024Updated last year
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- Scripts from my private ~/bin-tage☆22Feb 21, 2026Updated last month
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- This is the main repository for the OpenRepeater Project where WIKIs and Issues live.☆22Nov 28, 2020Updated 5 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- ☆49Jul 25, 2017Updated 8 years ago