☆68Jun 21, 2017Updated 8 years ago
Alternatives and similar repositories for locky
Users that are interested in locky are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆269Jun 15, 2021Updated 4 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆209Mar 12, 2025Updated last year
- Incident Response Scripts☆30Mar 1, 2020Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- ☆28Dec 7, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- Analysis PE file or Shellcode☆50Jul 28, 2016Updated 9 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆153Mar 17, 2016Updated 10 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,043Aug 23, 2021Updated 4 years ago
- A fork from http://create.stephan-brumme.com/hash-library/.☆16Jan 29, 2026Updated last month
- ☆31May 10, 2016Updated 9 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399May 20, 2016Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Web App for Volatility framework☆386Jan 13, 2026Updated 2 months ago