Malshare / MalShareView external linksLinks
☆25Dec 7, 2019Updated 6 years ago
Alternatives and similar repositories for MalShare
Users that are interested in MalShare are comparing it to the libraries listed below
Sorting:
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- A Maltego transform for VirusTotal Submitter Information☆35May 15, 2019Updated 6 years ago
- Start here!☆11Feb 19, 2020Updated 5 years ago
- Set of tools for interacting with Malshare☆160Mar 4, 2020Updated 5 years ago
- Offline voice-controlled music player for Raspberry Pi☆10May 27, 2024Updated last year
- ☆10Oct 22, 2017Updated 8 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- QMK Homebrew Formulae☆16May 28, 2025Updated 8 months ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- WIP Comprehensive reference description of telegram theming elements☆16Mar 8, 2024Updated last year
- Transforms Slonik query result field names.☆10May 7, 2024Updated last year
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- a set of files used to create an efficient Post-Production Keyboard Interface that works for me☆15Aug 26, 2025Updated 5 months ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- ☆16Dec 18, 2025Updated last month
- A revised version of Avery Pennarun's redo.☆11Nov 9, 2022Updated 3 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- Twinspark example app in Flask☆13Mar 13, 2023Updated 2 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Reverse engineering the Github websocket API - alive.github.com☆14Apr 19, 2023Updated 2 years ago
- RKD - RiotKit DO. Task executor - balance between Makefile and Gradle. Written in Python. Powerful tool for every DevOps. Automates produ…☆10May 6, 2022Updated 3 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated 2 weeks ago
- ☆14Mar 28, 2014Updated 11 years ago