☆14Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for flare-vm
Users that are interested in flare-vm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- UnpacMe IDA Byte Search☆28Nov 20, 2023Updated 2 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A simple example on how to initiate a direct syscall on WoW64☆12Feb 2, 2018Updated 8 years ago
- ☆14Jan 3, 2024Updated 2 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Research notes☆133Dec 6, 2024Updated last year
- Sample of creating minimal valve plugins.☆12Jan 18, 2019Updated 7 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- ksc4cpp is a shellcode framework for windows kernel based on C++☆21Feb 10, 2023Updated 3 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- sample bypass anti-anti-debug tool by race condition☆28Aug 2, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- IDA plugin for quickly copying disassembly as encoded hex bytes☆63Feb 5, 2022Updated 4 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- Dump Windows PE file information in C☆23May 2, 2015Updated 10 years ago
- Flipper Zero as SWD\JTAG debugger☆12Jun 26, 2023Updated 2 years ago
- ☆13Jul 3, 2021Updated 4 years ago
- Research browsers☆49Jan 9, 2026Updated 3 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Cobalt Strike Beacon configuration extractor and parser.☆161Oct 30, 2025Updated 5 months ago
- Scrips☆18Jun 12, 2018Updated 7 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 6 years ago
- Web based Manager for Yara Rules☆58Mar 9, 2020Updated 6 years ago
- A Powershell script for frequency analysis of separated values data files.☆17Jan 22, 2014Updated 12 years ago
- Convenience routines for working with the Unicorn emulator in Python☆31Feb 2, 2025Updated last year
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆38Nov 21, 2025Updated 4 months ago
- Queries for parsed spotlight database in sqlite☆13Dec 29, 2020Updated 5 years ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆13Jan 19, 2023Updated 3 years ago
- A C# based tool for analysing malicious OneNote documents☆118Apr 4, 2023Updated 3 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- ☆15May 3, 2024Updated last year
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year