Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"
☆39Oct 5, 2023Updated 2 years ago
Alternatives and similar repositories for embersim-databank
Users that are interested in embersim-databank are comparing it to the libraries listed below
Sorting:
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A Benchmark Dataset for Trustworthy Malware Family Classification under Concept Drift☆17Mar 14, 2025Updated 11 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Crack passwords with Hashcat using a Discord Bot.☆28Oct 30, 2023Updated 2 years ago
- Get the unique machine id of any host (without admin privileges)☆21Jul 15, 2025Updated 7 months ago
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- ☆13Dec 30, 2021Updated 4 years ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- ☆15Feb 28, 2020Updated 6 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- Documentation and guidance to practice secure coding for various PLC vendors☆42Oct 27, 2023Updated 2 years ago
- ☆16Aug 22, 2019Updated 6 years ago
- ☆18Mar 15, 2024Updated last year
- Reproduction of the paper//arxiv.org/pdf/1803.04173.pdf☆19May 21, 2018Updated 7 years ago
- ☆20Mar 14, 2025Updated 11 months ago
- An implementation of the paper "ELF-Miner: Using Structural Knowledge and Data Mining Methods To Detect New (Linux) Malicious Executables…☆15Dec 21, 2018Updated 7 years ago
- ☆16Jul 30, 2024Updated last year
- Hybrid Machine Learning Model for Malware Detection based on Windows Kernel Emulation☆41Apr 24, 2023Updated 2 years ago
- ☆164Oct 27, 2022Updated 3 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆18Oct 16, 2023Updated 2 years ago
- Network Policy Helper☆30Feb 9, 2026Updated last month
- Sherlock Discord bot☆19Aug 19, 2024Updated last year
- This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.☆20Jul 7, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- Discord bot for the Shodan API - OSINT tool☆87Mar 8, 2024Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Nov 5, 2023Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Detecting Malware in PE files☆27Aug 8, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago