Malware.lu tools
☆64Oct 28, 2013Updated 12 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- PE Import Hash Generator☆79Jul 17, 2017Updated 8 years ago
- Offline debugger for malware's reverse engineering☆116Jan 21, 2015Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- An example command dropper in rust.☆13Jun 8, 2018Updated 7 years ago
- Scans an internal network using massscan and nmap☆19Nov 21, 2025Updated 4 months ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Generates several metasploit payloads☆15Apr 13, 2018Updated 7 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- A CAN bus tool☆11Jul 13, 2015Updated 10 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- CarolinaCon13 Badge Jank☆16May 29, 2017Updated 8 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Methods of C2☆22Jul 15, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- [DEPRECATED] A web interface for the lovely virtual assistant Melissa.☆15Oct 10, 2016Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago