CrowdStrike / embersim-databankView external linksLinks
Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"
☆38Oct 5, 2023Updated 2 years ago
Alternatives and similar repositories for embersim-databank
Users that are interested in embersim-databank are comparing it to the libraries listed below
Sorting:
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆16Mar 14, 2025Updated 11 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Nov 2, 2025Updated 3 months ago
- ☆11Jun 15, 2022Updated 3 years ago
- ☆39Dec 31, 2025Updated last month
- ☆10Jun 16, 2022Updated 3 years ago
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- Implementation of CCS'2022 paper "SymLM: Predicting Function Names in Stripped Binaries via Context-Sensitive Execution-Aware Code Embedd…☆63Jul 6, 2025Updated 7 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆13Jun 13, 2023Updated 2 years ago
- Get the unique machine id of any host (without admin privileges)☆21Jul 15, 2025Updated 7 months ago
- ☆13Dec 30, 2021Updated 4 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- Additional code and data for the automated malware generation paper☆13May 4, 2024Updated last year
- ☆15Feb 28, 2020Updated 5 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆54Oct 19, 2023Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆41Oct 27, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- ☆18Mar 15, 2024Updated last year
- ☆20Mar 14, 2025Updated 11 months ago
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- ☆16Jul 30, 2024Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆20Jul 7, 2024Updated last year
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- Network Policy Helper☆30Updated this week
- ☆86Aug 16, 2025Updated 5 months ago
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Jul 5, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- Discord bot for the Shodan API - OSINT tool☆85Mar 8, 2024Updated last year