Another Repo of Malware. Enjoy. <3
☆60Feb 27, 2019Updated 7 years ago
Alternatives and similar repositories for MaliciousPark
Users that are interested in MaliciousPark are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ☆35Oct 27, 2019Updated 6 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 14 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127May 30, 2018Updated 7 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 8 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- ☆23Jan 4, 2015Updated 11 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 9 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆128Dec 3, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- ☆50Jan 13, 2020Updated 6 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness☆532Apr 3, 2026Updated last month
- CTFs I've played so far☆18Feb 1, 2025Updated last year
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Libgore☆13Apr 14, 2023Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- Javascript deobfuscation tool☆17Apr 6, 2018Updated 8 years ago
- A future hobby OS kernel☆11Nov 8, 2020Updated 5 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Apply YARA rules to your Cutter projects.☆16Jan 7, 2020Updated 6 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Jun 1, 2021Updated 4 years ago
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago