SPTHvx / SPTHLinks
Second Part To Hell's artworks: artificial (life/evolution/intelligence)
☆185Updated 2 years ago
Alternatives and similar repositories for SPTH
Users that are interested in SPTH are comparing it to the libraries listed below
Sorting:
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A golang CLI tool to download malware from a variety of sources.☆151Updated 7 months ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Updated 6 months ago
- Code snips and notes☆140Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated 2 years ago
- Bootkit sample for firmware attack☆266Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- ☆19Updated 2 years ago
- Research notes☆131Updated last year
- 0xpat blog☆109Updated 4 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Updated 5 months ago
- ☆122Updated last month
- Recon 2023 slides and code☆80Updated 2 years ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated last month
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆235Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆120Updated 2 years ago
- LD_PRELOAD rootkit☆137Updated last year
- My notes while studying Windows exploitation☆193Updated 2 years ago
- Comprehensive toolkit for Ghidra headless.☆363Updated 9 months ago
- ☆113Updated 4 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆60Updated 4 months ago
- ☆64Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆478Updated 7 months ago
- Resources for learning malware analysis and reverse engineering☆144Updated 2 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Updated 9 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago