Assortment of hashing algorithms used in malware
☆394Feb 8, 2026Updated 2 months ago
Alternatives and similar repositories for hashdb
Users that are interested in hashdb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HashDB API hash lookup plugin for IDA Pro☆353Mar 12, 2026Updated 3 weeks ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆858Feb 2, 2024Updated 2 years ago
- Research notes☆133Dec 6, 2024Updated last year
- Quickly debug shellcode extracted during malware analysis☆631May 23, 2023Updated 2 years ago
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆31Apr 24, 2022Updated 3 years ago
- A Pin Tool for tracing API calls etc☆1,641Feb 8, 2026Updated 2 months ago
- Windows kernel and user mode emulation.☆1,933Updated this week
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆943Jun 3, 2024Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆651Apr 2, 2026Updated last week
- Dynamic unpacker based on PE-sieve☆803Apr 1, 2026Updated last week
- ☆119Aug 7, 2022Updated 3 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Sep 15, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- High Octane Triage Analysis☆838Apr 2, 2026Updated last week
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆813Mar 16, 2024Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,940Updated this week
- A DTrace on Windows Reimplementation☆373Mar 12, 2026Updated 3 weeks ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Updated this week
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,031Jul 1, 2024Updated last year
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 7 months ago
- An IDA Plugin that help analyzing module that use COM☆231Oct 10, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- IDApython Scripts for Analyzing Golang Binaries☆667Aug 8, 2024Updated last year
- Official x64dbg plugin for IDA Pro.☆556Sep 24, 2024Updated last year
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- Go symbol recovery tool☆959Mar 6, 2026Updated last month
- Sleep Obfuscation☆824Dec 3, 2023Updated 2 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆263Mar 27, 2023Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,334Updated this week
- A Binary Genetic Traits Lexer Framework☆525Mar 30, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- ☆76Nov 30, 2023Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆350Jun 22, 2025Updated 9 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆585May 5, 2024Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- IDA Pro utilities from FLARE team☆2,450Oct 29, 2024Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year