Research notes
☆133Dec 6, 2024Updated last year
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- Assortment of hashing algorithms used in malware☆396Feb 8, 2026Updated last month
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- The best theme for x64dbg!☆91Aug 5, 2022Updated 3 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Oct 30, 2021Updated 4 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- Notes on using the Python bindings for the Unicorn Engine☆83Feb 14, 2020Updated 6 years ago
- Quickly debug shellcode extracted during malware analysis☆627May 23, 2023Updated 2 years ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆169Mar 30, 2025Updated 11 months ago
- HashDB API hash lookup plugin for IDA Pro☆354Mar 12, 2026Updated last week
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆220Updated this week
- ☆14May 16, 2023Updated 2 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Sep 15, 2022Updated 3 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆857Feb 2, 2024Updated 2 years ago
- ☆76Nov 30, 2023Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆940Jun 3, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Adding a little tay to IDA☆51Jan 28, 2024Updated 2 years ago
- FLARE Team's Binary Navigator☆314Feb 23, 2026Updated 3 weeks ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- High Octane Triage Analysis☆830Updated this week
- ☆50May 12, 2021Updated 4 years ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆814Mar 16, 2024Updated 2 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆13Feb 24, 2021Updated 5 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Jan 25, 2019Updated 7 years ago
- ☆41Apr 5, 2025Updated 11 months ago
- Dynamic unpacker based on PE-sieve☆797Sep 13, 2025Updated 6 months ago