[IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniques to analyse the behaviour and characteristics of analysed malware. Utilises PEfile library and PyREBox (VM sandbox)
☆22Jul 21, 2023Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Toolkit
Users that are interested in Malware-Analysis-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This (basic) AES and RSA file encryptor provides functions to encrypt and decrypt files using the AES and RSA cryptography algorithms. I…☆13Oct 8, 2023Updated 2 years ago
- A simple Python-based port scanner that allows you to scan open ports on a specified IPv4 address within a given port range. The scanner …☆12Aug 22, 2023Updated 2 years ago
- Sentiment Analysis Python script using NLP (NLTK's VADER model) tool that analyses text data and labels them with sentiment scores.☆15Apr 2, 2024Updated 2 years ago
- BB84 QKD simulation using the Python Qiskit library with various options: Simulation of a perfect implementation, low error rate, high er…☆13Feb 6, 2024Updated 2 years ago
- CTF wirte-ups☆14Oct 18, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆28Aug 2, 2025Updated 8 months ago
- CTF Write-ups☆25Mar 13, 2017Updated 9 years ago
- Challenges and writeups for PatriotCTF 2023☆26Sep 11, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- ☆11Jun 4, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 3 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 5 months ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆25Apr 12, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆12Apr 10, 2025Updated last year
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆94Nov 13, 2025Updated 5 months ago
- small wiki engine based on static reST files and git for versionning☆25Oct 26, 2015Updated 10 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆54Jan 10, 2013Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- A technical content explaining Data structures and Algorithms in JavaScript.☆23Oct 30, 2025Updated 5 months ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 7 months ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- xLEAPP - Merging of iLEAPP/RLEAPP/vLEAPP, ALEAPP, cLEAPP☆53Apr 6, 2026Updated last week
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- Set of plugins and library for dynamic pdb generation and synchronisation☆39May 3, 2024Updated last year
- Simple tool to add imports recovered by VMSweeper (by Vamit) to VMProtect dump file☆14Jun 27, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A curated list of awesome appsec tools available on Ubuntu 🗄️☆12Mar 4, 2024Updated 2 years ago
- 关闭恶意驱动的文件和注册表保护☆14Jun 28, 2022Updated 3 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- An ongoing collection of awesome android security tools, software, libraries, learning tutorials, frameworks, academic and practical reso…☆32Dec 31, 2021Updated 4 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- ⚖️ Freier Zugang zu unseren Gesetzen.☆14Jun 16, 2025Updated 10 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year