☆14Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for flare-vm
Users that are interested in flare-vm are comparing it to the libraries listed below
Sorting:
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- The best theme for x64dbg!☆91Aug 5, 2022Updated 3 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Convenience routines for working with the Unicorn emulator in Python☆31Feb 2, 2025Updated last year
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- Parses the WMI object database....looking for persistence☆34Dec 12, 2019Updated 6 years ago
- Research notes☆132Dec 6, 2024Updated last year
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆38Nov 21, 2025Updated 3 months ago
- $MFT parser (from live systems or a copy of the $MFT) and raw file copy utility☆38Jul 18, 2024Updated last year
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 4 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Apr 22, 2019Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Updated this week
- ☆94Feb 18, 2021Updated 5 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆14Jul 26, 2025Updated 7 months ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- ☆11Apr 16, 2025Updated 10 months ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago