Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets of PE and ELF malware samples.
☆17Apr 6, 2023Updated 2 years ago
Alternatives and similar repositories for malkom
Users that are interested in malkom are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Tools used by many projects☆16Updated this week
- ☆15May 26, 2021Updated 4 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- Tools for signing Windows files☆15Updated this week
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- Автор Зорков Игорь.☆18May 6, 2019Updated 6 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- Still point in moving world.☆49Oct 6, 2022Updated 3 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- ☆19Dec 12, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Sep 1, 2023Updated 2 years ago
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 2 weeks ago
- PKCS#7 Extractor library for Delphi☆26Jun 14, 2021Updated 4 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- ☆11Feb 14, 2023Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Dec 29, 2025Updated 2 months ago