Links or additional data to some researches
☆14May 24, 2019Updated 6 years ago
Alternatives and similar repositories for work
Users that are interested in work are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- ☆36Jan 27, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 11 months ago
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 7 years ago
- Symmetric JavaScript☆13Jul 12, 2017Updated 8 years ago
- Dump of this tool I found☆23Sep 1, 2015Updated 10 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆15Jan 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 5 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Oct 17, 2020Updated 5 years ago
- Better-xNet - a fork of the original xNet library☆11Jan 8, 2020Updated 6 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- An HTTP proxy that enables access to Tor Onion Services☆17Dec 16, 2021Updated 4 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆36Apr 1, 2016Updated 10 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆38Apr 22, 2019Updated 7 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 7 years ago
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- Simple way to read wirte delete values from registry☆16Jun 24, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆12Updated this week
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- personal redirect server☆17Aug 11, 2016Updated 9 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago