Just a normal flask web app to understand win32api with code snippets and references.
☆75Dec 8, 2019Updated 6 years ago
Alternatives and similar repositories for malwinx
Users that are interested in malwinx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A framework to generate unique test cases based on code snippets to test techniques☆54May 11, 2021Updated 4 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 7 years ago
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- .NET wrapper for dbghelp.dll☆21Jun 13, 2019Updated 6 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- ☆14Aug 27, 2025Updated 7 months ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆77Jan 30, 2020Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Injects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.☆237Jan 15, 2019Updated 7 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- an asynchronous target enumeration tool☆247Dec 8, 2022Updated 3 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆157Mar 28, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆332Dec 8, 2022Updated 3 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last month
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Real Time Threat Monitoring Tool☆115Nov 16, 2022Updated 3 years ago