Code snips and notes
☆140Mar 10, 2022Updated 3 years ago
Alternatives and similar repositories for Lab-Notes
Users that are interested in Lab-Notes are comparing it to the libraries listed below
Sorting:
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- HashDB API hash lookup plugin for IDA Pro☆349Oct 9, 2025Updated 4 months ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Feb 5, 2022Updated 4 years ago
- Research notes☆132Dec 6, 2024Updated last year
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆855Feb 2, 2024Updated 2 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Assortment of hashing algorithms used in malware☆391Feb 8, 2026Updated 2 weeks ago
- Dynamic unpacker based on PE-sieve☆796Sep 13, 2025Updated 5 months ago
- ☆13Oct 29, 2022Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆626May 23, 2023Updated 2 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- High Octane Triage Analysis☆817Updated this week
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 8 months ago
- A Binary Genetic Traits Lexer Framework☆522Aug 14, 2025Updated 6 months ago
- ☆23May 23, 2024Updated last year
- The best theme for x64dbg!☆91Aug 5, 2022Updated 3 years ago
- Notes on using the Python bindings for the Unicorn Engine☆82Feb 14, 2020Updated 6 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆932Jun 3, 2024Updated last year
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- LERN GHIDRA☆93Aug 14, 2025Updated 6 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Repository for the code snippets from the AllThingsIDA video channel☆127Oct 9, 2025Updated 4 months ago
- ☆32Apr 24, 2022Updated 3 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,026Jul 1, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,613Jan 13, 2024Updated 2 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- Malware repository component for samples & static configuration with REST API interface.☆376Updated this week
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 7 months ago
- Analyses in IDA/Hex-Rays☆87Apr 6, 2023Updated 2 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago