NoThrowForwardIt / Automated-Malware-Analysis-ListLinks
My personal Automated Malware Analysis Sandboxes and Services
☆23Updated 8 years ago
Alternatives and similar repositories for Automated-Malware-Analysis-List
Users that are interested in Automated-Malware-Analysis-List are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A curated list of tools for incident response☆32Updated last year
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 6 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- Malware analyses and helpful scripts☆29Updated 3 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆57Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- ☆24Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- IoC's, PCRE's, YARA's etc☆24Updated 8 months ago
- ☆10Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Updated 8 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Updated 9 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Updated 2 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Infecting PE☆25Updated 11 years ago
- SWF Vulnerability & Information Scanner☆19Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago