☆45Feb 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for EnAnalisis
Users that are interested in EnAnalisis are comparing it to the libraries listed below
Sorting:
- List of Awesome Red Teaming Resources☆13Sep 2, 2021Updated 4 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Just some lists of Malware Configs☆173Jan 9, 2025Updated last year
- Yet another windows syscall library☆18Jun 22, 2020Updated 5 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- ☆210Mar 22, 2021Updated 4 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- API Hooking Engine on Windows 10☆12May 10, 2024Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆314Nov 4, 2025Updated 4 months ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆15Mar 26, 2023Updated 2 years ago
- ☆24Feb 14, 2024Updated 2 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- ☆43Jan 2, 2023Updated 3 years ago
- Dump certificates from PE files in different formats☆39Dec 25, 2023Updated 2 years ago
- AdHoc solutions☆49Aug 29, 2023Updated 2 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- ☆96May 5, 2025Updated 10 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- ☆32Jul 14, 2025Updated 8 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- String Fixer for ConfuserEx2☆15Feb 20, 2023Updated 3 years ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- ☆127Mar 7, 2026Updated last week
- ☆11Jan 14, 2021Updated 5 years ago