The educational Animus malware
☆18Sep 25, 2019Updated 6 years ago
Alternatives and similar repositories for Animus
Users that are interested in Animus are comparing it to the libraries listed below
Sorting:
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Ida Pro Ultimate Qt Build Guide☆27Dec 13, 2018Updated 7 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- ☆14Aug 12, 2015Updated 10 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- Public repository of the dynamic binary analysis framework WEASEL. WEASEL's main purpose is the identification and elimination of backdoo…☆15Nov 10, 2020Updated 5 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Tools to enumerate Windows Firewall Hook Drivers on Windows 2000, XP and 2003☆21Jan 19, 2015Updated 11 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 9 years ago
- Cross Platform Malware Development Framework☆68Nov 3, 2015Updated 10 years ago
- The JSidle Javascript packer☆23Sep 16, 2010Updated 15 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago