Malware.lu configuration extractor
☆26Mar 27, 2014Updated 12 years ago
Alternatives and similar repositories for config_extractor
Users that are interested in config_extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Malware.lu tools☆65Oct 28, 2013Updated 12 years ago
- Samples of Avatar firmware analysis (including NDSS'14 cases)☆20Jun 27, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- Python bindings for AsmJit☆12Aug 13, 2012Updated 13 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆58May 21, 2019Updated 7 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 11 years ago
- Malware analysis tool☆22Apr 27, 2025Updated last year
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- Some VxWorks fuzzing examples using Cisco-Kitty and WDBDbg framework☆19Mar 13, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Messing around with clamav sigs☆27Apr 15, 2026Updated last month
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- ACTIVELabs Security Advisories☆24May 19, 2021Updated 5 years ago
- IP Cam Honeypot☆20Feb 28, 2024Updated 2 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 10 years ago
- records of my daily sec learning☆13Mar 20, 2020Updated 6 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆12Sep 10, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- ☆50Dec 28, 2012Updated 13 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago