Lena's scripts/code/resources for malware analysis
☆26Jun 13, 2024Updated last year
Alternatives and similar repositories for LenaMalwareAnalysis
Users that are interested in LenaMalwareAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆23May 24, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 5 months ago
- Lena's repo of Malware Monsters aka Malmons.☆45Feb 12, 2026Updated 2 months ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆14Oct 25, 2022Updated 3 years ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆52Mar 7, 2025Updated last year
- ☆51Feb 21, 2025Updated last year
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- ☆18Mar 26, 2024Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- Published Articles of the Past (trying to be as complete as possible)☆15Jan 20, 2021Updated 5 years ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 3 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- CVE-2025-4123 - Grafana Tool☆32Jun 4, 2025Updated 10 months ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated last year
- Python bindings for the Icicle emulator.☆41Nov 6, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- ☆15Jun 5, 2019Updated 6 years ago
- Rerousces related to time-travel debugging (TTD)☆38Jan 6, 2026Updated 3 months ago
- ☆35Jan 13, 2026Updated 3 months ago
- ☆11Mar 12, 2021Updated 5 years ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆19Mar 27, 2024Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Oct 4, 2024Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- anveshan is a completed script that helps to automate your recon process, It finds subdomains, urls, js files, parameters, screenshots, a…☆30Oct 29, 2024Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- A blog about learning how to use the Frida dynamic instrumentation toolkit with Android☆34Jan 31, 2023Updated 3 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Apr 6, 2026Updated last week