A tool to retrieve malware directly from the source for security researchers.
☆39May 10, 2017Updated 8 years ago
Alternatives and similar repositories for maltrieve
Users that are interested in maltrieve are comparing it to the libraries listed below
Sorting:
- Simple tool to regularly pool Tor HSDirs for hidden service descriptors☆10Jul 3, 2015Updated 10 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- Unofficial mirror of☆11Feb 2, 2018Updated 8 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11May 29, 2019Updated 6 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Codec tools for the twitter mux protocol☆12Apr 21, 2016Updated 9 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆14Sep 22, 2018Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Jan 10, 2019Updated 7 years ago
- .netアプリケーションの関数を実行時に置き換えるプログラム☆15Jan 21, 2017Updated 9 years ago
- A variety of content chunking algorithms with a common API in rust☆18Jun 18, 2023Updated 2 years ago
- Unicorn PE function runner☆59Jul 4, 2017Updated 8 years ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- Malware captured with honeypots☆38Oct 2, 2017Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Malware Dynamic Analysis Platform enhanced Cuckoo Sandbox☆24Jan 10, 2018Updated 8 years ago
- 382 Slayer Leecher Keywords.☆10Apr 19, 2021Updated 4 years ago
- Small, fast, header only, zero dependency cryptographic library.☆25Aug 3, 2023Updated 2 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 5 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- Vine: The BitBlaze Static Analysis Component☆26Sep 27, 2014Updated 11 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 6 months ago
- The controllers and config for custom resources pertaining to egressing logs and metrics.☆24Jul 10, 2020Updated 5 years ago
- ida for android☆26May 15, 2017Updated 8 years ago
- A collection of infosec related scripts and information.☆53Oct 2, 2024Updated last year
- A UEFI application that measures the number of cycles involved in a VM entry/exit☆31Oct 3, 2017Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Jul 27, 2017Updated 8 years ago
- Network Service Header Linux kernel module implementation☆26Mar 6, 2016Updated 9 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- Modified edition of cuckoo☆406Nov 21, 2017Updated 8 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Demodulate on/off keying☆27Dec 9, 2015Updated 10 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Cross-platform tool for scanning memory of other processes☆29Nov 8, 2016Updated 9 years ago