This repository contains supplemental files for the REMnux distro and the source files for the Debian packages that the distro installs from the REMnux package repository on Launchpad.
☆106Feb 9, 2026Updated last month
Alternatives and similar repositories for distro
Users that are interested in distro are comparing it to the libraries listed below
Sorting:
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆53Feb 4, 2026Updated last month
- This repository maintains the SaltStack state files for the REMnux distro.☆55Feb 27, 2026Updated last week
- This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMn…☆294Feb 10, 2026Updated last month
- Wazuh indexer, the Wazuh search engine☆24Updated this week
- ☆15Updated this week
- Portable pipestatus for UNIX/POSIX shells☆24Jan 8, 2021Updated 5 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ☆14Feb 25, 2025Updated last year
- Parse and build simple ELFs (useful for mapping memory to load into IDA and other disassemblers)☆17Sep 19, 2023Updated 2 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆40Jun 12, 2016Updated 9 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆22Sep 4, 2023Updated 2 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,396Dec 23, 2025Updated 2 months ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆145Apr 23, 2020Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Jul 13, 2021Updated 4 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- A Linux/Windows Ransomware PoC written in Python, Go and C☆16Jun 17, 2023Updated 2 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Pull weather reports from NOAA and Weather Underground and display them in a desktop bar like polybar or lemonbar☆20Sep 23, 2025Updated 5 months ago
- ☆26Jan 7, 2024Updated 2 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Jul 23, 2015Updated 10 years ago
- ☆58Feb 27, 2026Updated last week
- site source jivoi.github.io☆22Nov 7, 2022Updated 3 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- YARA rules for use with ProcFilter☆90Jul 28, 2017Updated 8 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Huawei DG8045 & HG633 Devices Exploitation Tool☆27Aug 24, 2020Updated 5 years ago
- A python library for building and using hash databases.☆22Mar 3, 2026Updated last week
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago