Links or additional data to some researches
☆14May 24, 2019Updated 6 years ago
Alternatives and similar repositories for work
Users that are interested in work are comparing it to the libraries listed below
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ☆34Jan 27, 2025Updated last year
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 8 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆35Apr 1, 2016Updated 9 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆38Apr 22, 2019Updated 6 years ago
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆11Nov 19, 2017Updated 8 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- personal redirect server☆17Aug 11, 2016Updated 9 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- ☆17Aug 3, 2025Updated 7 months ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Disassemblers with various trimming methodologies☆15Jan 1, 2025Updated last year
- A Splunk technology add-on for osquery☆14Sep 5, 2025Updated 6 months ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago