Python tool to analyze PE file for patterns used by malware
☆27Nov 12, 2022Updated 3 years ago
Alternatives and similar repositories for pestudio-cli
Users that are interested in pestudio-cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- security related events, tools, tutorials, cheatsheets, and more.☆11Oct 20, 2015Updated 10 years ago
- Zero Wine Tryouts: An open source malware analysis tool☆17Jun 7, 2016Updated 9 years ago
- Rekall Memory Forensic Framework☆33Aug 5, 2019Updated 6 years ago
- Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a tar…☆15Apr 21, 2025Updated 11 months ago
- ☆10Jan 9, 2026Updated 2 months ago
- Python package for the RC4 algorithm☆14Apr 2, 2017Updated 8 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Deep learning malware detection system using the EMBER dataset☆11Nov 22, 2024Updated last year
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- PE Analyzer utility tool☆14Oct 21, 2020Updated 5 years ago
- Common libraries used across the server repos☆21Aug 3, 2024Updated last year
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Attempt to use the machine learning workflow to process and transform sampled PE file data to create a prediction model.☆40Apr 2, 2021Updated 4 years ago
- ZAP Website☆20Mar 16, 2026Updated last week
- Easily scan for CVEs using nmap.☆16Jan 13, 2022Updated 4 years ago
- hooklib is a library that is used to inject DLL libraries in the processes, the interception code and the implementation of IPC.☆22Nov 18, 2015Updated 10 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- ☆13Jun 19, 2018Updated 7 years ago
- 基于半监督深度学习的木马流量检测方法☆29Jun 11, 2023Updated 2 years ago
- Python script that downloads complete webpages with all assets for offline viewing keeping the structure and style of the page!☆32Jul 22, 2025Updated 8 months ago
- ☆17Sep 30, 2020Updated 5 years ago
- Hunting Newly Registered Domains☆10Jan 6, 2019Updated 7 years ago
- WiFi hacking with aircrack-ng support scripts☆11Oct 4, 2017Updated 8 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- ☆13May 22, 2021Updated 4 years ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- This project was created to bring together most of the tools used in CTF to solve steganography challenges.☆18Jul 26, 2023Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- A tool for profiling HTTPX using cProfile and SnakeViz☆12Aug 4, 2020Updated 5 years ago
- Code for PepysDiary.com☆16Mar 9, 2026Updated 2 weeks ago
- ☆80Dec 6, 2019Updated 6 years ago
- ☆14Jul 18, 2023Updated 2 years ago
- ☆14Mar 15, 2023Updated 3 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Jun 30, 2019Updated 6 years ago
- 🐍🛥🌟 Running Python in the browser with Batavia and Starlette☆12Sep 14, 2019Updated 6 years ago