☆19Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for AnalyzePESig
Users that are interested in AnalyzePESig are comparing it to the libraries listed below
Sorting:
- ☆13Aug 19, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- ☆27Oct 19, 2018Updated 7 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- A .NET tool that allows you to easily change the Visual Studio version information in a solution file using a Visual Studio version numbe…☆12Updated this week
- ☆10Apr 20, 2022Updated 3 years ago
- original project for thermostat & hygrostat to made egg incubator☆10Aug 5, 2020Updated 5 years ago
- This repo includes all necessary libraries and codes for the Ultiamte Home Automation project tutorial☆12Jan 14, 2019Updated 7 years ago
- ☆36Feb 2, 2015Updated 11 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- ☆10Mar 4, 2023Updated 3 years ago
- ☆44Nov 2, 2023Updated 2 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆37Oct 25, 2017Updated 8 years ago
- Binary Ninja Posters☆35Oct 14, 2020Updated 5 years ago
- A smart calculator using natural language processing☆32Oct 30, 2022Updated 3 years ago
- Programmers' GUI tool for converting between various data types.☆12Jul 22, 2024Updated last year
- A Windows information stealer / credential stealer written in Go for security research and malware analysis. Demonstrates browser passwo…☆26Dec 15, 2025Updated 2 months ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- Directly Upload this code into your Esp8266 12e development board buy changing its Host name and password, than you will be able to obser…☆11May 31, 2016Updated 9 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Visual Studio extension that checks for files that have 'Copy to output directory' set to 'Copy always'.☆11Mar 19, 2025Updated 11 months ago
- Visual Stuidio extension based on Everything search engine (https://www.voidtools.com/).☆10May 27, 2017Updated 8 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- ☆16May 13, 2021Updated 4 years ago
- This repo contains the code for the project.☆11May 29, 2023Updated 2 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Aug 17, 2021Updated 4 years ago