[IN THE WORKS] Python script designed to provide comprehensive analysis of malware samples, combining static and dynamic analysis techniques to analyse the behaviour and characteristics of analysed malware. Utilises PEfile library and PyREBox (VM sandbox)
☆22Jul 21, 2023Updated 2 years ago
Alternatives and similar repositories for Malware-Analysis-Toolkit
Users that are interested in Malware-Analysis-Toolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This (basic) AES and RSA file encryptor provides functions to encrypt and decrypt files using the AES and RSA cryptography algorithms. I…☆13Oct 8, 2023Updated 2 years ago
- A simple Python-based port scanner that allows you to scan open ports on a specified IPv4 address within a given port range. The scanner …☆12Aug 22, 2023Updated 2 years ago
- This Python script uses the pyClamd library to scan a specified file for malware using ClamAV antivirus engine. If malware is detected, i…☆14Dec 28, 2023Updated 2 years ago
- Sentiment Analysis Python script using NLP (NLTK's VADER model) tool that analyses text data and labels them with sentiment scores.☆15Apr 2, 2024Updated 2 years ago
- BB84 QKD simulation using the Python Qiskit library with various options: Simulation of a perfect implementation, low error rate, high er…☆13Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CTF wirte-ups☆14Oct 18, 2020Updated 5 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆28Aug 2, 2025Updated 9 months ago
- Static extraction of dridex malware configuration☆19Nov 2, 2015Updated 10 years ago
- Challenges and writeups for PatriotCTF 2023☆26Sep 11, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 5 months ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆26Apr 12, 2026Updated 3 weeks ago
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆12Apr 10, 2025Updated last year
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆42Feb 24, 2023Updated 3 years ago
- ☆10Apr 19, 2026Updated 2 weeks ago
- Backup the history (and related contexts) of a FetLife.com user account.☆21Dec 15, 2022Updated 3 years ago
- small wiki engine based on static reST files and git for versionning☆25Oct 26, 2015Updated 10 years ago
- ☆18Apr 26, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆15Aug 17, 2023Updated 2 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- A technical content explaining Data structures and Algorithms in JavaScript.☆23Oct 30, 2025Updated 6 months ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- xLEAPP - Merging of iLEAPP/RLEAPP/vLEAPP, ALEAPP, cLEAPP☆53Apr 27, 2026Updated last week
- ☆15Mar 10, 2026Updated last month
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆14Feb 6, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Set of plugins and library for dynamic pdb generation and synchronisation☆39May 3, 2024Updated 2 years ago
- A curated list of awesome appsec tools available on Ubuntu 🗄️☆12Mar 4, 2024Updated 2 years ago
- Simple tool to add imports recovered by VMSweeper (by Vamit) to VMProtect dump file☆14Jun 27, 2017Updated 8 years ago
- Notes only☆21May 2, 2022Updated 4 years ago
- Collection of CTF challenges I made☆53Jan 3, 2025Updated last year
- A tool to generate a freebsd cross compiler (gcc) in linux☆12Feb 20, 2012Updated 14 years ago
- A community collection of security reviews of open source software components.☆99Feb 29, 2024Updated 2 years ago