Code snips and notes
☆141Mar 10, 2022Updated 4 years ago
Alternatives and similar repositories for Lab-Notes
Users that are interested in Lab-Notes are comparing it to the libraries listed below
Sorting:
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- HashDB API hash lookup plugin for IDA Pro☆354Mar 12, 2026Updated last week
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Feb 5, 2022Updated 4 years ago
- Research notes☆133Dec 6, 2024Updated last year
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆856Feb 2, 2024Updated 2 years ago
- Assortment of hashing algorithms used in malware☆396Feb 8, 2026Updated last month
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆797Sep 13, 2025Updated 6 months ago
- ☆76Nov 30, 2023Updated 2 years ago
- ☆13Oct 29, 2022Updated 3 years ago
- The best theme for x64dbg!☆91Aug 5, 2022Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆627May 23, 2023Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 8 months ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- A Binary Genetic Traits Lexer Framework☆524Updated this week
- High Octane Triage Analysis☆824Updated this week
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆940Jun 3, 2024Updated last year
- Repository for the code snippets from the AllThingsIDA video channel☆129Oct 9, 2025Updated 5 months ago
- ☆23May 23, 2024Updated last year
- An IDA Pro extension for easier (malware) reverse engineering☆116Aug 2, 2022Updated 3 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Malware repository component for samples & static configuration with REST API interface.☆381Updated this week
- translate project of Drops☆12May 26, 2016Updated 9 years ago
- Small programs and scripts that do not require their own repositories☆139Feb 24, 2022Updated 4 years ago
- Cobalt Strike Beacon configuration extractor and parser.☆159Oct 30, 2025Updated 4 months ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes☆171Aug 15, 2025Updated 7 months ago
- LERN GHIDRA☆94Aug 14, 2025Updated 7 months ago
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- ☆19Sep 21, 2020Updated 5 years ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- A golang CLI tool to download malware from a variety of sources.☆151Jul 3, 2025Updated 8 months ago