MalPhobic / MalwareReportsView external linksLinks
☆12Feb 8, 2021Updated 5 years ago
Alternatives and similar repositories for MalwareReports
Users that are interested in MalwareReports are comparing it to the libraries listed below
Sorting:
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- In honor of the mighty Korvo and his Pupa!☆18Nov 11, 2024Updated last year
- This is an Android mobile banking app i created in mid 2012. The project is 80% complete.☆11Jun 13, 2013Updated 12 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- ☆13Dec 3, 2022Updated 3 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- https://www.youtube.com/watch?v=qsjGj_L1kyo☆10Jul 29, 2021Updated 4 years ago
- ☆14Jul 26, 2021Updated 4 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Jul 2, 2021Updated 4 years ago
- An open-source toolkit for analyzing line-oriented JSON Twitter archives with Apache Spark.☆10Dec 11, 2024Updated last year
- Data types and factories for bank accounts in the swedish banking system, Handelsbanken, ICA-banken, Nordea, SEB, Skandiabanken, Swedbank…☆13Jan 3, 2021Updated 5 years ago
- SpyCore - Windows Malicious FIle Scanner (Distributes)☆14Jun 10, 2023Updated 2 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆12Jun 21, 2021Updated 4 years ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- Arduino based iCUE lighting controller☆12Jan 3, 2020Updated 6 years ago
- JARVIS AI APP FOR ANDROID AND WINDOWS (2K+ Downloads!)☆34Jan 27, 2026Updated 2 weeks ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆11Sep 26, 2020Updated 5 years ago
- Utilities for interacting with the Actiontec MI424WR router used by Verizon FIOS.☆15Oct 4, 2009Updated 16 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 4 years ago
- ☆14May 19, 2019Updated 6 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- a phishing page☆14Aug 7, 2017Updated 8 years ago
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆19Dec 23, 2020Updated 5 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- A wrapper with auto-reconnect for Go RabbitMQ client http://github.com/streadway/amqp☆12Dec 20, 2018Updated 7 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- ARM to pseudo code converter that rarely works☆14Dec 21, 2017Updated 8 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- A study on the automation of unpacking API wrapping in Themida☆12May 3, 2018Updated 7 years ago
- ☆33Oct 3, 2025Updated 4 months ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- ☆15Jan 2, 2019Updated 7 years ago