Sources code extracted from malwares for analysis
☆40Mar 10, 2023Updated 3 years ago
Alternatives and similar repositories for Cerberus
Users that are interested in Cerberus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Apk infector && Frida injector☆23Jul 25, 2024Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- mobile application (ipa & apk) static analysis tool☆16May 23, 2025Updated 11 months ago
- ☆19Jul 29, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Aug 15, 2021Updated 4 years ago
- Code for the solutions of practical reverse engineering☆23Jan 17, 2020Updated 6 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Apr 21, 2022Updated 4 years ago
- subhook wrapper for Nim https://github.com/Zeex/subhook☆19Dec 23, 2024Updated last year
- https://anonfiles.com/Nde4I9F9x1/FraudFoxWin11_zip☆12Feb 4, 2022Updated 4 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Some malware samples or suspicious files I found and their reports.☆42Nov 28, 2021Updated 4 years ago
- ☆26Nov 20, 2019Updated 6 years ago
- ☆19Mar 31, 2022Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- Powerful Python tool to analyze PDF documents☆26May 15, 2022Updated 3 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 6 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- ☆29May 4, 2021Updated 5 years ago
- ☆12Jun 29, 2021Updated 4 years ago