☆27Nov 26, 2024Updated last year
Alternatives and similar repositories for Config-Extractors
Users that are interested in Config-Extractors are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- ☆31Nov 28, 2023Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago
- Simple PoC causing overflow☆20Oct 11, 2023Updated 2 years ago
- ☆38Mar 3, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- ☆35Jan 13, 2026Updated 3 months ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆23Apr 4, 2023Updated 3 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- A Terraform framework for deploying to Oracle Cloud Infrastructure. This is the landing zone (starting point) for the framework.☆13Jan 21, 2025Updated last year
- ☆25Jan 8, 2024Updated 2 years ago
- World CIDR IP lists☆10Jan 28, 2026Updated 3 months ago
- shared samples from #dailyphish and/or #apt tweets☆42Sep 3, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Python Library for ConfigExtractor☆16Feb 24, 2026Updated 2 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 11 months ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 3 years ago
- ☆24Feb 3, 2021Updated 5 years ago
- Configuration Extractors for Malware☆125Apr 23, 2025Updated last year
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆46Aug 12, 2025Updated 8 months ago
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Repository of Yara Rules☆143Apr 29, 2026Updated last week
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated 3 months ago
- Demo showcasing Maldev Academy’s code search database☆42Feb 20, 2024Updated 2 years ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- ☆16Apr 21, 2023Updated 3 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 10 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 3 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆120Apr 8, 2023Updated 3 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆12Apr 26, 2026Updated last week
- fork from http://hashlib.codeplex.com☆12Oct 27, 2025Updated 6 months ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆31Oct 10, 2019Updated 6 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Malware Configuration Extraction Modules☆50Nov 25, 2023Updated 2 years ago